On the security of an identity based multi-proxy signature scheme
暂无分享,去创建一个
Zhong Chen | Fagen Li | Jian-bin Hu | Hu Xiong | Zhong Chen | Zhong Chen | Jian-bin Hu | Hu Xiong | Fagen Li | H. Xiong
[1] Eiji Okamoto,et al. Proxy signatures for delegating signing operation , 1996, CCS '96.
[2] Zhenfu Cao,et al. A secure identity-based multi-proxy signature scheme , 2009, Comput. Electr. Eng..
[3] Mihir Bellare,et al. Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.
[4] M. Mambo,et al. Proxy Signatures: Delegation of the Power to Sign Messages (Special Section on Information Theory and Its Applications) , 1996 .
[5] Amos Fiat,et al. How to Prove Yourself: Practical Solutions to Identification and Signature Problems , 1986, CRYPTO.
[6] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[7] Bogdan Warinschi,et al. Secure Proxy Signature Schemes for Delegation of Signing Rights , 2010, Journal of Cryptology.
[8] Byoungcheon Lee,et al. Secure Mobile Agent Using Strong Non-designated Proxy Signature , 2001, ACISP.
[9] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[10] Jean-Jacques Quisquater,et al. A "Paradoxical" Indentity-Based Signature Scheme Resulting from Zero-Knowledge , 1988, CRYPTO.
[11] Satoshi Obana,et al. The Hierarchy of Key Evolving Signatures and a Characterization of Proxy Signatures , 2004, EUROCRYPT.
[12] Kefei Chen,et al. Multi-proxy Signature and Proxy Multi-signature Schemes from Bilinear Pairings , 2004, PDCAT.
[13] Basel Alomair,et al. Efficient Generic Forward-Secure Signatures and Proxy Signatures , 2008, EuroPKI.
[14] Chanathip Namprempre,et al. Security Proofs for Identity-Based Identification and Signature Schemes , 2008, Journal of Cryptology.
[15] Kefei Chen,et al. ID-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature schemes from bilinear pairings , 2005, Appl. Math. Comput..
[16] Jean-Jacques Quisquater,et al. The Exact Security of an Identity Based Signature and its Applications , 2004, IACR Cryptol. ePrint Arch..
[17] Tsz Hon Yuen,et al. Proxy Ring Signature: Formal Definitions, Efficient Construction and New Variant , 2006, 2006 International Conference on Computational Intelligence and Security.
[18] Kan Zhang,et al. Threshold Proxy Signature Schemes , 1997, ISW.
[19] Dongho Won,et al. Proxy signatures, Revisited , 1997, ICICS.