Some New Proxy Signature Schemes from Pairings
暂无分享,去创建一个
Reihaneh Safavi-Naini | Fangguo Zhang | Chin-Yin Lin | R. Safavi-Naini | Fangguo Zhang | Chin-Yin Lin
[1] Dongho Won,et al. Proxy signatures, Revisited , 1997, ICICS.
[2] Jung Hee Cheon,et al. An Analysis of Proxy Signatures: Is a Secure Channel Necessary? , 2003, CT-RSA.
[3] Kwangjo Kim,et al. ID-Based Blind Signature and Ring Signature from Pairings , 2002, ASIACRYPT.
[4] Liqun Chen,et al. Certification of Public Keys within an Identity Based System , 2002, ISC.
[5] Kan Zhang,et al. Threshold Proxy Signature Schemes , 1997, ISW.
[6] Byoungcheon Lee,et al. Secure Mobile Agent Using Strong Non-designated Proxy Signature , 2001, ACISP.
[7] Hovav Shacham,et al. Short Signatures from the Weil Pairing , 2001, J. Cryptol..
[8] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[9] Kwangjo Kim,et al. Efficient ID-Based Blind Signature and Proxy Signature from Bilinear Pairings , 2003, ACISP.
[10] Guoqiang Bai,et al. Proxy multi-signature scheme: a new type of proxy signature scheme , 2000 .
[11] Kenneth G. Paterson,et al. ID-based Signatures from Pairings on Elliptic Curves , 2002, IACR Cryptol. ePrint Arch..
[12] Jung Hee Cheon,et al. An Identity-Based Signature from Gap Diffie-Hellman Groups , 2003, Public Key Cryptography.
[13] M. Mambo,et al. Proxy Signatures: Delegation of the Power to Sign Messages (Special Section on Information Theory and Its Applications) , 1996 .
[14] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[15] Florian Hess,et al. Efficient Identity Based Signature Schemes Based on Pairings , 2002, Selected Areas in Cryptography.