Provably secure multi-proxy signature scheme with revocation in the standard model
暂无分享,去创建一个
Yupu Hu | Hua Ma | Zhenhua Liu | Xiangsong Zhang | Yu-pu Hu | Zhenhua Liu | Xiangsong Zhang | Hua Ma
[1] Hua Ma,et al. Secure proxy signature scheme with fast revocation in the standard model , 2009 .
[2] Ashutosh Saxena,et al. An Efficient Proxy Signature Scheme with Revocation , 2004, Informatica.
[3] Bo,et al. Multi-Proxy Signature Without Random Oracles , 2008 .
[4] Min-Shiang Hwang,et al. A new proxy signature scheme with revocation , 2005, Appl. Math. Comput..
[5] Bogdan Warinschi,et al. Secure Proxy Signature Schemes for Delegation of Signing Rights , 2010, Journal of Cryptology.
[6] Pla Information,et al. New Proxy Multi-Signature, Multi-Proxy Signature and Multi-Proxy Multi-Signature Schemes from Bilinear Pairings , 2004 .
[7] Ran Canetti,et al. The random oracle methodology, revisited , 2000, JACM.
[8] Byoungcheon Lee,et al. Strong Proxy Signature and its Applications , 2000 .
[9] C. F. Chong,et al. Cryptanalysis of Harn digital multisignature scheme with distinguished signing authorities [comment] , 2000 .
[10] Yong Yu,et al. Improvement of a proxy multi-signature scheme without random oracles , 2011, Comput. Commun..
[11] Kenneth G. Paterson,et al. Proxy Signatures Secure Against Proxy Key Exposure , 2008, Public Key Cryptography.
[12] Brent Waters,et al. Efficient Identity-Based Encryption Without Random Oracles , 2005, EUROCRYPT.
[13] Yupu Hu,et al. Secure Proxy Multi-signature Scheme in the Standard Model , 2008, ProvSec.
[14] Yi Mu,et al. Proxy Signature Without Random Oracles , 2006, MSN.
[15] Kenneth G. Paterson,et al. Efficient Identity-Based Signatures Secure in the Standard Model , 2006, ACISP.
[16] Hwang Shin-Jia,et al. New multi-proxy multi-signature schemes , 2004 .
[17] Dongho Won,et al. Proxy signatures, Revisited , 1997, ICICS.
[18] Gaëtan Leurent,et al. How Risky Is the Random-Oracle Model? , 2009, CRYPTO.
[19] Lifeng Guo,et al. Insider attacks on multi-proxy multi-signature schemes , 2007, Comput. Electr. Eng..
[20] M. Mambo,et al. Proxy Signatures: Delegation of the Power to Sign Messages (Special Section on Information Theory and Its Applications) , 1996 .
[21] Sang-Ho Lee,et al. A Mediated Proxy Signature Scheme with Fast Revocation for Electronic Transactions , 2005, TrustBus.
[22] Dan Boneh,et al. A Method for Fast Revocation of Public Key Certificates and Security Capabilities , 2001, USENIX Security Symposium.
[23] Zhenfu Cao,et al. A secure identity-based multi-proxy signature scheme , 2009, Comput. Electr. Eng..
[24] Kefei Chen,et al. ID-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature schemes from bilinear pairings , 2005, Appl. Math. Comput..
[25] Hung-Min Sun,et al. Design of time-stamped proxy signatures with traceable receivers , 2000 .