A Batch Verification for Multiple Proxy Signature
暂无分享,去创建一个
[1] Dongho Won,et al. Proxy signatures, Revisited , 1997, ICICS.
[2] Cheng-Chi Lee,et al. Two Simple Batch Verifying Multiple Digital Signatures , 2001, ICICS.
[3] Jinli Xie,et al. Effect of Short-Term Synaptic Plasticity on Correlated firing in Feedback Networks , 2011 .
[4] Qi Xie,et al. Cryptanalysis of Two Nonrepudiable Threshold Proxy Signature Schemes , 2006, Int. J. Netw. Secur..
[5] Lein Harn,et al. Design of generalised ElGamal type digital signature schemes based on discrete logarithm , 1994 .
[6] M. Mambo,et al. Proxy Signatures: Delegation of the Power to Sign Messages (Special Section on Information Theory and Its Applications) , 1996 .
[7] Girraj Kumar Verma. A Proxy Blind Signature Scheme over Braid Groups , 2009, Int. J. Netw. Secur..
[8] Kan Zhang,et al. Threshold Proxy Signature Schemes , 1997, ISW.
[9] Eric Jui-Lin Lu,et al. Abstract , 2003, Appetite.
[10] Guoqiang Bai,et al. Proxy multi-signature scheme: a new type of proxy signature scheme , 2000 .
[11] Kitae Kim,et al. Remark on Shao et al.'s Bidirectional Proxy Re-signature Scheme in Indocrypt'07 , 2009, Int. J. Netw. Secur..
[12] Eric Jui-Lin Lu,et al. Cryptanalysis of the Batch Verifying Multiple DSA-Type Digital Signature , 2001 .
[13] Min-Shiang Hwang,et al. A Secure Nonrepudiable Threshold Proxy Signature Scheme with Known Signers , 2000, Informatica.
[14] Cheng-Chi Lee,et al. Cryptanalysis and improvement on batch verifying multiple RSA digital signatures , 2006, Appl. Math. Comput..
[15] Zuo-Wen Tan. Improvement on Nominative Proxy Signature Schemes , 2008, Int. J. Netw. Secur..
[16] L. Harn. Batch verifying multiple DSA-type digital signatures , 1998 .
[17] Min-Shiang Hwang,et al. Cryptanalysis of the Batch Verifying Multiple RSA Digital Signatures , 2000, Informatica.
[18] David M'Raïhi,et al. Can D.S.A. be Improved? Complexity Trade-Offs with the Digital Signature Standard , 1994, EUROCRYPT.
[19] Zhenfu Cao,et al. Factoring based proxy signature schemes , 2006 .
[20] Ashutosh Saxena,et al. Proxy Signature Scheme with Effective Revocation Using Bilinear Pairings , 2007, Int. J. Netw. Secur..
[21] Ashutosh Saxena,et al. C R ] 2 0 D ec 2 00 6 Algorithms and Approaches of Proxy Signature : A Survey MANIK , 2008 .
[22] Min-Shiang Hwang,et al. A nonrepudiable threshold multi-proxy multi-signature scheme with shared verification , 2004, Future Gener. Comput. Syst..
[23] Tzonelih Hwang,et al. On Zhang's Nonrepudiable Proxy Signature Schemes , 1998, ACISP.
[24] Chien-Lung Hsu,et al. New proxy multi-signature scheme , 2005, Appl. Math. Comput..
[25] Zuhua Shao,et al. Proxy signature schemes based on factoring , 2003, Inf. Process. Lett..
[26] Eiji Okamoto,et al. Proxy signatures for delegating signing operation , 1996, CCS '96.
[27] Lein Harn,et al. Batch verifying multiple RSA digital signatures , 1998 .