Factoring based proxy signature schemes
暂无分享,去创建一个
[1] Byoungcheon Lee,et al. Secure Mobile Agent Using Strong Non-designated Proxy Signature , 2001, ACISP.
[2] B. Clifford Neuman,et al. Proxy-based authorization and accounting for distributed systems , 1993, [1993] Proceedings. The 13th International Conference on Distributed Computing Systems.
[3] Zhenfu Cao,et al. Nonrepudiable proxy multi-signature scheme , 2003, Journal of Computer Science and Technology.
[4] Hung-Min Sun,et al. Remark on Two Nonrepudiable Proxy Signature Schemes , 1999 .
[5] Hung-Min Sun,et al. Threshold proxy signatures , 1999 .
[6] Torben P. Pedersen. Distributed Provers with Applications to Undeniable Signatures , 1991, EUROCRYPT.
[7] Kan Zhang,et al. Threshold Proxy Signature Schemes , 1997, ISW.
[8] Zuhua Shao,et al. Proxy signature schemes based on factoring , 2003, Inf. Process. Lett..
[9] Zhenfu Cao. A threshold key escrow scheme based on public key cryptosystem , 2001 .
[10] Dongho Won,et al. Proxy signatures, Revisited , 1997, ICICS.
[11] Hung-Min Sun,et al. An efficient nonrepudiable threshold proxy signature scheme with known signers , 1999, Comput. Commun..
[12] Byoungcheon Lee,et al. Strong Proxy Signature and its Applications , 2000 .
[13] Guoqiang Bai,et al. Proxy multi-signature scheme: a new type of proxy signature scheme , 2000 .
[14] Eiji Okamoto,et al. Proxy signatures for delegating signing operation , 1996, CCS '96.
[15] Min-Shiang Hwang,et al. Generalization of proxy signature based on elliptic curves , 2004, Comput. Stand. Interfaces.
[16] Min-Shiang Hwang,et al. A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem , 2003, IEEE Trans. Knowl. Data Eng..
[17] Yi Li-jiang. Proxy Multi-Signature:A New Type of Proxy Signature Schemes , 2001 .
[18] Min-Shiang Hwang,et al. Generalization of proxy signature-based on discrete logarithms , 2003, Comput. Secur..
[19] Vijay Varadharajan,et al. An analysis of the proxy problem in distributed systems , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.
[20] Hwang Shin-Jia,et al. New multi-proxy multi-signature schemes , 2004 .
[21] Tzonelih Hwang,et al. On Zhang's Nonrepudiable Proxy Signature Schemes , 1998, ACISP.
[22] Shin-Jia Hwang,et al. New multi-proxy multi-signature schemes , 2004, Appl. Math. Comput..
[23] Min-Shiang Hwang,et al. On the efficiency of nonrepudiable threshold proxy signature scheme with known signers , 2004, J. Syst. Softw..
[24] Zuhua Shao,et al. Improvement of threshold proxy signature scheme , 2004, Comput. Stand. Interfaces.
[25] Yu-Fang Chung,et al. A proxy-protected proxy signature scheme based on elliptic curve cryptosystem , 2002, 2002 IEEE Region 10 Conference on Computers, Communications, Control and Power Engineering. TENCOM '02. Proceedings..
[26] Li Ji. IMPROVEMENT OF A THRESHOLD PROXY SIGNATURE SCHEME , 2002 .
[27] Ji Jia. A New Proxy Multi-Signature Scheme , 2004 .
[28] Cao,et al. Improvement of M-U-O and K-P-W proxy signature schemes , 2002 .
[29] M. Mambo,et al. Proxy Signatures: Delegation of the Power to Sign Messages (Special Section on Information Theory and Its Applications) , 1996 .
[30] Chien-Lung Hsu,et al. New proxy multi-signature scheme , 2005, Appl. Math. Comput..