A Proxy Transitive Signature Scheme
暂无分享,去创建一个
Chao Lin | Fei Zhu | Xiaoling Tao | Wei Wu | Wei Wu | Chao Lin | Fei Zhu | Xiaoling Tao
[1] Li Xu,et al. Universal designated verifier transitive signatures for graph-based big data , 2015, Inf. Sci..
[2] B. Clifford Neuman,et al. Proxy-based authorization and accounting for distributed systems , 1993, [1993] Proceedings. The 13th International Conference on Distributed Computing Systems.
[3] Gregory Neven. A simple transitive signature scheme for directed trees , 2008, Theor. Comput. Sci..
[4] Byoungcheon Lee,et al. Secure Mobile Agent Using Strong Non-designated Proxy Signature , 2001, ACISP.
[5] Yi Mu,et al. A Short Proxy Signature Scheme: Efficient Authentication in the Ubiquitous World , 2005, EUC Workshops.
[6] Fengtong Wen,et al. Improvement of a forward-secure proxy signature scheme , 2010, 2010 2nd International Conference on Computer Engineering and Technology.
[7] M. Mambo,et al. Proxy Signatures: Delegation of the Power to Sign Messages (Special Section on Information Theory and Its Applications) , 1996 .
[8] Eiji Okamoto,et al. Proxy signatures for delegating signing operation , 1996, CCS '96.
[9] Susan Rae Hohenberger,et al. The cryptographic impact of groups with infeasible inversion , 2003 .
[10] Yi Li-jiang. Proxy Multi-Signature:A New Type of Proxy Signature Schemes , 2001 .
[11] Xiaohu Yang,et al. Designated-receiver proxy signature scheme for electronic commerce , 2003, SMC'03 Conference Proceedings. 2003 IEEE International Conference on Systems, Man and Cybernetics. Conference Theme - System Security and Assurance (Cat. No.03CH37483).
[12] Zheng Huang,et al. Transitive Signature Scheme from LFSR , 2010 .
[13] Vijay Varadharajan,et al. An analysis of the proxy problem in distributed systems , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.
[14] Liu Yi-he. One Controllable Proxy Signature Scheme , 2004 .
[15] Yi Mu,et al. An efficient anonymous proxy signature scheme with provable security , 2009, Comput. Stand. Interfaces.
[16] Jung Hee Cheon,et al. An Analysis of Proxy Signatures: Is a Secure Channel Necessary? , 2003, CT-RSA.
[17] Jia Xu. On Directed Transitive Signature , 2009, IACR Cryptol. ePrint Arch..
[18] Bogdan Warinschi,et al. Secure Proxy Signature Schemes for Delegation of Signing Rights , 2010, Journal of Cryptology.
[19] Jianfeng Ma,et al. New Publicly Verifiable Databases with Efficient Updates , 2015, IEEE Transactions on Dependable and Secure Computing.
[20] Congwei Xu,et al. A proxy blind signature scheme based on DLP , 2006, Wuhan University Journal of Natural Sciences.
[21] Hung-Min Sun,et al. An efficient nonrepudiable threshold proxy signature scheme with known signers , 1999, Comput. Commun..
[22] Takeshi Okamoto,et al. A proposal of short proxy signature using pairing , 2005, International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II.
[23] Min-Shiang Hwang,et al. A nonrepudiable threshold multi-proxy multi-signature scheme with shared verification , 2004, Future Gener. Comput. Syst..
[24] Jin Wang,et al. Mutual Verifiable Provable Data Auditing in Public Cloud Storage , 2015 .
[25] Mihir Bellare,et al. Transitive signatures: new schemes and proofs , 2005, IEEE Transactions on Information Theory.
[26] Xun Yi. Directed Transitive Signature Scheme , 2007, CT-RSA.
[27] B. B. Amberker,et al. Controlled Delegation in e-cheques Using Proxy Signatures , 2007, 11th IEEE International Enterprise Distributed Object Computing Conference (EDOC 2007).
[28] Silvio Micali,et al. Transitive Signature Schemes , 2002, CT-RSA.
[29] Dongho Won,et al. Proxy signatures, Revisited , 1997, ICICS.
[30] Zhenfu Cao,et al. Transitive Signatures from Braid Groups , 2007, INDOCRYPT.
[31] Yi Mu,et al. An Efficient Construction of Convertible Undeniable Proxy Signatures , 2014 .
[32] Mihir Bellare,et al. Transitive Signatures Based on Factoring and RSA , 2002, ASIACRYPT.
[33] Cao Zhen-fu. Present situation and progress of proxy signature , 2003 .
[34] Byoungcheon Lee,et al. Strong Proxy Signature and its Applications , 2000 .
[35] Zuowen Tan,et al. Digital Proxy Blind Signature Schemes Based on DLP and ECDLP , 2002 .
[36] Chunming Tang,et al. A New Forward-Secure Proxy Signature Scheme , 2010, 2010 International Forum on Information Technology and Applications.
[37] Mihir Bellare,et al. Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.
[38] Silvio Micali,et al. A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks , 1988, SIAM J. Comput..
[39] Philippe Camacho,et al. Short Transitive Signatures for Directed Trees , 2012, CT-RSA.