An efficient certificateless multi-proxy signature scheme without pairing
暂无分享,去创建一个
Lunzhi Deng | Huawei Huang | Yunyun Qu | Xiaomin Bao | Huawei Huang | Yunyun Qu | Lunzhi Deng | Xiaomin Bao
[1] Jianhua Chen,et al. An ID-based client authentication with key agreement protocol for mobile client-server environment on ECC with provable security , 2012, Inf. Fusion.
[2] Byoungcheon Lee,et al. Strong Proxy Signature and its Applications , 2000 .
[3] Zhenfu Cao,et al. Formalized security model of multi-proxy signature schemes , 2005, The Fifth International Conference on Computer and Information Technology (CIT'05).
[4] Jianhua Chen,et al. An ID-based proxy signature schemes without bilinear pairings , 2011, Ann. des Télécommunications.
[5] Ian T. Foster,et al. A security architecture for computational grids , 1998, CCS '98.
[6] Zhenfu Cao,et al. A secure identity-based multi-proxy signature scheme , 2009, Comput. Electr. Eng..
[7] Xiaoni Du,et al. A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges , 2010, Inf. Sci..
[8] M. Mambo,et al. Proxy Signatures: Delegation of the Power to Sign Messages (Special Section on Information Theory and Its Applications) , 1996 .
[9] Futai Zhang,et al. A new multi-proxy signature from bilinear pairing , 2007 .
[10] Kwangjo Kim,et al. ID-Based Multi-Proxy Signature and Blind Multisignature from Bilinear Pairings , 2003 .
[11] Kenneth G. Paterson,et al. Certificateless Public Key Cryptography , 2003 .
[12] Yupu Hu,et al. Certificateless signcryption scheme in the standard model , 2010, Inf. Sci..
[13] Ashutosh Saxena,et al. C R ] 2 0 D ec 2 00 6 Algorithms and Approaches of Proxy Signature : A Survey MANIK , 2008 .
[14] Qiaoyan Wen,et al. Certificateless multi-proxy signature , 2011, Comput. Commun..
[15] Andrew S. Tanenbaum,et al. A law-abiding peer-to-peer network for free-software distribution , 2001, Proceedings IEEE International Symposium on Network Computing and Applications. NCA 2001.
[16] He Debiao,et al. An ID-based proxy signature schemes without bilinear pairings , 2011 .
[17] Hu Jin,et al. An ID-based client authentication with key agreement protocol for mobile client-server environment on ECC with provable security , 2012 .
[18] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.