An Ordered Multi-proxy Multi-signature Scheme
暂无分享,去创建一个
[1] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[2] Kan Zhang,et al. Threshold Proxy Signature Schemes , 1997, ISW.
[3] Zhenfu Cao,et al. On Security of Two Nonrepudiable Threshold Multi-proxy Multi-signature Schemes with Shared Verification , 2007, Int. J. Netw. Secur..
[4] Eric Jui-Lin Lu,et al. Abstract , 2003, Appetite.
[5] Ashutosh Saxena,et al. Proxy Signature Scheme with Effective Revocation Using Bilinear Pairings , 2007, Int. J. Netw. Secur..
[6] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[7] Eiji Okamoto,et al. Proxy signatures for delegating signing operation , 1996, CCS '96.
[8] M. Mambo,et al. Proxy Signatures: Delegation of the Power to Sign Messages (Special Section on Information Theory and Its Applications) , 1996 .
[9] Pla Information. A New Multi-proxy Multi-signature Scheme , 2006 .
[10] Min-Shiang Hwang,et al. A Secure Nonrepudiable Threshold Proxy Signature Scheme with Known Signers , 2000, Informatica.
[11] Guoqiang Bai,et al. Proxy multi-signature scheme: a new type of proxy signature scheme , 2000 .
[12] Hwang Shin-Jia,et al. New multi-proxy multi-signature schemes , 2004 .
[13] Chin-Chen Chang,et al. Parallel computation of the generating keys for RSA cryptosystems , 1996 .
[14] Dongho Won,et al. Proxy signatures, Revisited , 1997, ICICS.
[15] Yang Liu,et al. Security Analysis and Improvement of Hsu et al. Threshold Proxy Signature Scheme , 2006, Int. J. Netw. Secur..
[16] Qi Xie,et al. Cryptanalysis of Two Nonrepudiable Threshold Proxy Signature Schemes , 2006, Int. J. Netw. Secur..
[17] Tzong-Chen Wu,et al. New nonrepudiable threshold proxy signature scheme with known signers , 2001, J. Syst. Softw..
[18] Hung-Min Sun,et al. Threshold proxy signatures , 1999 .
[19] Chin-Chen Chang,et al. A watermarking technique based on one-way hash functions , 1999, IEEE Trans. Consumer Electron..
[20] Hung-Min Sun,et al. An efficient nonrepudiable threshold proxy signature scheme with known signers , 1999, Comput. Commun..
[21] Tzonelih Hwang,et al. On Zhang's Nonrepudiable Proxy Signature Schemes , 1998, ACISP.