A robust (k, n) + 1 threshold proxy signature scheme based on factoring
暂无分享,去创建一个
Zhenfu Cao | Rongxing Lu | Haojin Zhu | Haojin Zhu | Rongxing Lu | Z. Cao
[1] Zhenfu Cao. A threshold key escrow scheme based on public key cryptosystem , 2001 .
[2] Hung-Min Sun,et al. An efficient nonrepudiable threshold proxy signature scheme with known signers , 1999, Comput. Commun..
[3] Sihan Qing,et al. Threshold Undeniable RSA Signature Scheme , 2001, ICICS.
[4] Victor Shoup,et al. Practical Threshold Signatures , 2000, EUROCRYPT.
[5] Mihir Bellare,et al. The Exact Security of Digital Signatures - HOw to Sign with RSA and Rabin , 1996, EUROCRYPT.
[6] Hung-Min Sun,et al. Time-Stamp Proxy Signature with Traceable Receivers , 1999 .
[7] Wang Gui. IMPROVEMENT OF SHOUP'S THRESHOLD RSA SIGNATURE SCHEME , 2002 .
[8] Kan Zhang,et al. Threshold Proxy Signature Schemes , 1997, ISW.
[9] Matthew K. Franklin,et al. Efficient generation of shared RSA keys , 2001, JACM.
[10] Min-Shiang Hwang,et al. A Secure Nonrepudiable Threshold Proxy Signature Scheme with Known Signers , 2000, Informatica.
[11] Guoqiang Bai,et al. Proxy multi-signature scheme: a new type of proxy signature scheme , 2000 .
[12] Hwang Shin-Jia,et al. New multi-proxy multi-signature schemes , 2004 .
[13] Tzong-Chen Wu,et al. New nonrepudiable threshold proxy signature scheme with known signers , 2001, J. Syst. Softw..
[14] Hung-Min Sun,et al. Threshold proxy signatures , 1999 .
[15] Eiji Okamoto,et al. Proxy signatures for delegating signing operation , 1996, CCS '96.
[16] Cao Zhen. Two Classes of Robust Threshold Key Escrow Schemes , 2003 .
[17] M. Mambo,et al. Proxy Signatures: Delegation of the Power to Sign Messages (Special Section on Information Theory and Its Applications) , 1996 .