Proxy signature schemes based on factoring
暂无分享,去创建一个
[1] Dongho Won,et al. Proxy signatures, Revisited , 1997, ICICS.
[2] Hung-Min Sun,et al. Design of time-stamped proxy signatures with traceable receivers , 2000 .
[3] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[4] Shafi Goldwasser,et al. Advances in Cryptology — CRYPTO’ 88: Proceedings , 1990, Lecture Notes in Computer Science.
[5] Hung-Min Sun,et al. An efficient nonrepudiable threshold proxy signature scheme with known signers , 1999, Comput. Commun..
[6] Eiji Okamoto,et al. Proxy signatures for delegating signing operation , 1996, CCS '96.
[7] Qi Shi,et al. Anonymous Public-key Certificates for Anonymous and Fair Document Exchange , 2000 .
[8] Guoqiang Bai,et al. Proxy multi-signature scheme: a new type of proxy signature scheme , 2000 .
[9] Hung-Min Sun,et al. Threshold proxy signatures , 1999 .
[10] Jean-Jacques Quisquater,et al. A "Paradoxical" Indentity-Based Signature Scheme Resulting from Zero-Knowledge , 1988, CRYPTO.
[11] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[12] Kan Zhang,et al. Threshold Proxy Signature Schemes , 1997, ISW.
[13] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[14] M. Mambo,et al. Proxy Signatures: Delegation of the Power to Sign Messages (Special Section on Information Theory and Its Applications) , 1996 .
[15] B. Clifford Neuman,et al. Proxy-based authorization and accounting for distributed systems , 1993, [1993] Proceedings. The 13th International Conference on Distributed Computing Systems.