Efficient Authorization in Delegation Chains with Strong Non-Repudiation
暂无分享,去创建一个
[1] Patrick Horster,et al. A New Approach for Delegation Using Hierarchical Delegation Tokens , 1997, Communications and Multimedia Security.
[2] Hung-Min Sun,et al. On the Security of Some Proxy Signature Schemes , 2003, IACR Cryptol. ePrint Arch..
[3] Jung Hee Cheon,et al. An Analysis of Proxy Signatures: Is a Secure Channel Necessary? , 2003, CT-RSA.
[4] Eiji Okamoto,et al. Proxy signatures for delegating signing operation , 1996, CCS '96.
[5] Taher ElGamal,et al. A public key cyryptosystem and signature scheme based on discrete logarithms , 1985 .
[6] M. Mambo,et al. Proxy Signatures: Delegation of the Power to Sign Messages (Special Section on Information Theory and Its Applications) , 1996 .
[7] C. P. Schnorr,et al. Efficient Identification and Signatures for Smart Cards (Abstract) , 1989, EUROCRYPT.
[8] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[9] Byoungcheon Lee,et al. Strong Proxy Signature and its Applications , 2000 .