Further Cryptanalysis of some Proxy Signature Schemes
暂无分享,去创建一个
[1] M. Mambo,et al. Proxy Signatures: Delegation of the Power to Sign Messages (Special Section on Information Theory and Its Applications) , 1996 .
[2] Byoungcheon Lee,et al. Secure Mobile Agent Using Strong Non-designated Proxy Signature , 2001, ACISP.
[3] Dongho Won,et al. Proxy signatures, Revisited , 1997, ICICS.
[4] Hung-Min Sun,et al. On the Security of Some Proxy Signature Schemes , 2003, IACR Cryptol. ePrint Arch..
[5] Byoungcheon Lee,et al. Strong Proxy Signature and its Applications , 2000 .
[6] Kan Zhang,et al. Threshold Proxy Signature Schemes , 1997, ISW.
[7] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[8] Victor K.-W. Wei,et al. A strong proxy signature scheme with proxy signer privacy protection , 2002, Proceedings. Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises.
[9] R. Stephenson. A and V , 1962, The British journal of ophthalmology.