Summary of Digital Signature
暂无分享,去创建一个
[1] Dawn Xiaodong Song,et al. Practical forward secure group signature schemes , 2001, CCS '01.
[2] Alfredo De Santis,et al. Advances in Cryptology — EUROCRYPT'94 , 1994, Lecture Notes in Computer Science.
[3] Zhenfu Cao,et al. Nonrepudiable proxy multi-signature scheme , 2003, Journal of Computer Science and Technology.
[4] Holger Petersen,et al. How to Convert any Digital Signature Scheme into a Group Signature Scheme , 1997, Security Protocols Workshop.
[5] Mihir Bellare,et al. A Forward-Secure Digital Signature Scheme , 1999, CRYPTO.
[6] Jan Camenisch,et al. Fair Blind Signatures , 1995, EUROCRYPT.
[7] Donald W. Davies,et al. Advances in Cryptology — EUROCRYPT ’91 , 2001, Lecture Notes in Computer Science.
[8] Burton S. Kaliski. Advances in Cryptology - CRYPTO '97 , 1997 .
[9] Jean-Jacques Quisquater,et al. Advances in Cryptology — EUROCRYPT ’95 , 2001, Lecture Notes in Computer Science.
[10] Shafi Goldwasser,et al. Advances in Cryptology — CRYPTO’ 88: Proceedings , 1990, Lecture Notes in Computer Science.
[11] Jung Hee Cheon,et al. An Analysis of Proxy Signatures: Is a Secure Channel Necessary? , 2003, CT-RSA.
[12] Amos Fiat,et al. Untraceable Electronic Cash , 1990, CRYPTO.
[13] David Chaum,et al. Group Signatures , 1991, EUROCRYPT.
[14] Jan Camenisch,et al. Efficient group signature schemes for large groups , 1997 .
[15] Michael Wiener,et al. Advances in Cryptology — CRYPTO’ 99 , 1999 .
[16] Cao,et al. Improvement of M-U-O and K-P-W proxy signature schemes , 2002 .
[17] Douglas R. Stinson,et al. Advances in Cryptology — CRYPTO’ 93 , 2001, Lecture Notes in Computer Science.
[18] Yang Yue. Secure and efficient group blind signature scheme , 2009 .
[19] Dongho Won,et al. Proxy signatures, Revisited , 1997, ICICS.
[20] Jan Camenisch,et al. Efficient Group Signature Schemes for Large Groups (Extended Abstract) , 1997, CRYPTO.
[21] M. Mambo,et al. Proxy Signatures: Delegation of the Power to Sign Messages (Special Section on Information Theory and Its Applications) , 1996 .
[22] Stefan A. Brands,et al. Untraceable Off-line Cash in Wallet with Observers , 2002 .
[23] Jianying Zhou,et al. Information and Communications Security , 2013, Lecture Notes in Computer Science.
[24] Jan Camenisch,et al. An efficient fair payment system , 1996, CCS '96.
[25] Victor K.-W. Wei,et al. A strong proxy signature scheme with proxy signer privacy protection , 2002, Proceedings. Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises.
[26] Kan Zhang,et al. Threshold Proxy Signature Schemes , 1997, ISW.
[27] Jan Camenisch,et al. Blind Signatures Based on the Discrete Logarithm Problem , 1994, EUROCRYPT.