Improvement of identity-based threshold proxy signature scheme with known signers
暂无分享,去创建一个
[1] Hung-Min Sun,et al. Threshold proxy signatures , 1999 .
[2] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[3] Kan Zhang,et al. Threshold Proxy Signature Schemes , 1997, ISW.
[4] Torben P. Pedersen. Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing , 1991, CRYPTO.
[5] Zhenfu Cao,et al. Identity-Based Threshold Proxy Signature Scheme with Known Signers , 2006, TAMC.
[6] Tzong-Chen Wu,et al. Improvement of threshold proxy signature scheme , 2003, Appl. Math. Comput..
[7] Dongho Won,et al. Proxy signatures, Revisited , 1997, ICICS.
[8] Min-Shiang Hwang,et al. A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem , 2003, IEEE Trans. Knowl. Data Eng..
[9] Florian Hess,et al. Efficient Identity Based Signature Schemes Based on Pairings , 2002, Selected Areas in Cryptography.
[10] M. Mambo,et al. Proxy Signatures: Delegation of the Power to Sign Messages (Special Section on Information Theory and Its Applications) , 1996 .
[11] Zuhua Shao,et al. Improvement of threshold proxy signature scheme , 2004, Comput. Stand. Interfaces.