Cryptanalysis of Some Group-Oriented Proxy Signature Schemes
暂无分享,去创建一个
[1] Qi Xie,et al. Cryptanalysis of Two Nonrepudiable Threshold Proxy Signature Schemes , 2006, Int. J. Netw. Secur..
[2] Zhenfu Cao,et al. Proxy signature scheme using self-certified public keys , 2004, Appl. Math. Comput..
[3] Eiji Okamoto,et al. Proxy signatures for delegating signing operation , 1996, CCS '96.
[4] Zhenfu Cao,et al. Improvement of Yang et al.'s threshold proxy signature scheme , 2007, J. Syst. Softw..
[5] Min-Shiang Hwang,et al. An improvement of nonrepudiable threshold proxy signature scheme with known signers , 2004, Comput. Secur..
[6] Chien-Lung Hsu,et al. Self-certified threshold proxy signature schemes with message recovery, nonrepudiation, and traceability , 2005, Appl. Math. Comput..
[7] Zuhua Shao,et al. Improvement of efficient proxy signature schemes using self-certified public keys , 2005, Appl. Math. Comput..
[8] Marc Girault,et al. Self-Certified Public Keys , 1991, EUROCRYPT.
[9] Chien-Lung Hsu,et al. Efficient proxy signature schemes using self-certified public keys , 2004, Appl. Math. Comput..
[10] Jiqiang Lu,et al. Security Weaknesses in Two Proxy Signature Schemes , 2006, ICCSA.
[11] Zuhua Shao. Improvement of digital signature with message recovery using self-certified public keys and its variants , 2004, Appl. Math. Comput..
[12] Robert H. Deng,et al. Security Analysis of Some Proxy Signatures , 2003, ICISC.
[13] Zhenfu Cao,et al. A Threshold Proxy Signature Scheme Using Self-Certified Public Keys , 2004, ISPA.
[14] Min-Shiang Hwang,et al. A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem , 2003, IEEE Trans. Knowl. Data Eng..
[15] Yu-Fang Chung,et al. A traceable proxy multisignature scheme based on the elliptic curve cryptosystem , 2004, Appl. Math. Comput..
[16] Kan Zhang,et al. Threshold Proxy Signature Schemes , 1997, ISW.
[17] Mingsheng Wang,et al. On the Security of Some Nonrepudiable Threshold Proxy Signature Schemes , 2005, ISPEC.
[18] Robert H. Deng,et al. Comments on "A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem" , 2004, IEEE Trans. Knowl. Data Eng..
[19] Min-Shiang Hwang,et al. On the efficiency of nonrepudiable threshold proxy signature scheme with known signers , 2004, J. Syst. Softw..
[20] Yu-Fang Chung,et al. Efficient proxy multisignature schemes based on the elliptic curve cryptosystem , 2003, Comput. Secur..
[21] Guoqiang Bai,et al. Proxy multi-signature scheme: a new type of proxy signature scheme , 2000 .
[22] Chien-Lung Hsu,et al. Efficient nonrepudiable threshold proxy signature scheme with known signers against the collusion attack , 2005, Appl. Math. Comput..
[23] Hung-Min Sun,et al. Cryptanalysis of a Threshold Proxy Signature Scheme , 2004 .
[24] Tzong-Chen Wu,et al. New nonrepudiable threshold proxy signature scheme with known signers , 2001, J. Syst. Softw..
[25] Yumin Yuan,et al. Improvement of Hsu-Wu-He's Proxy Multi-signature Schemes , 2005, Secure Data Management.
[26] Dongho Won,et al. Proxy signatures, Revisited , 1997, ICICS.