Efficient Multi-Proxy Signature Scheme with Short Length in the Standard Model
暂无分享,去创建一个
[1] Dan Boneh,et al. Short Signatures Without Random Oracles and the SDH Assumption in Bilinear Groups , 2008, Journal of Cryptology.
[2] Takeshi Okamoto,et al. Extended Proxy Signatures for Smart Cards , 1999, ISW.
[3] Jianhong Zhang,et al. An efficient RSA-based certificateless signature scheme , 2012, J. Syst. Softw..
[4] Jianhong Zhang,et al. An ID-Based Server-Aided Verification Short Signature Scheme Avoid Key Escrow , 2013, J. Inf. Sci. Eng..
[5] Pla Information,et al. New Proxy Multi-Signature, Multi-Proxy Signature and Multi-Proxy Multi-Signature Schemes from Bilinear Pairings , 2004 .
[6] Qiaoyan Wen,et al. Certificateless proxy multi-signature , 2014, Inf. Sci..
[7] Zhenfu Cao,et al. A secure identity-based multi-proxy signature scheme , 2009, Comput. Electr. Eng..
[8] Jianhong Zhang,et al. An efficient secure proxy verifiably encrypted signature scheme , 2010, J. Netw. Comput. Appl..
[9] Yi Mu,et al. A New Signature Scheme Without Random Oracles from Bilinear Pairings , 2006, VIETCRYPT.
[10] Jianhong Zhang,et al. Another Efficient Proxy Signature Scheme in the Standard Model , 2010, 2010 International Conference of Information Science and Management Engineering.
[11] Jie Xu,et al. Improved certificateless multi-proxy signature , 2012 .
[12] Hua Ma,et al. Secure proxy signature scheme with fast revocation in the standard model , 2009 .
[13] Dengguo Feng,et al. ID-Based Proxy Signature Using Bilinear Pairings , 2005, ISPA Workshops.
[14] Brent Waters,et al. Efficient Identity-Based Encryption Without Random Oracles , 2005, EUROCRYPT.
[15] Yi Mu,et al. Proxy Signature Without Random Oracles , 2006, MSN.
[16] Yupu Hu,et al. Provably secure multi-proxy signature scheme with revocation in the standard model , 2011, Comput. Commun..
[17] Dongho Won,et al. Proxy signatures, Revisited , 1997, ICICS.
[18] Dan Boneh,et al. Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles , 2004, IACR Cryptol. ePrint Arch..
[19] Ran Canetti,et al. The random oracle methodology, revisited , 2000, JACM.
[20] Yang Xiaoyuan,et al. New multi-signature and proxy multi-signature schemes from the Weil pairings , 2004, InfoSecu '04.
[21] Bo,et al. Multi-Proxy Signature Without Random Oracles , 2008 .
[22] Bogdan Warinschi,et al. Secure Proxy Signature Schemes for Delegation of Signing Rights , 2010, Journal of Cryptology.
[23] Yupu Hu,et al. Secure Proxy Multi-signature Scheme in the Standard Model , 2008, ProvSec.
[24] Robert H. Deng,et al. Security Analysis of Some Proxy Signatures , 2003, ICISC.
[25] M. Mambo,et al. Proxy Signatures: Delegation of the Power to Sign Messages (Special Section on Information Theory and Its Applications) , 1996 .
[26] Jianhong Zhang,et al. Short computational Diffie–Hellman‐based proxy signature scheme in the standard model , 2014, Int. J. Commun. Syst..
[27] Jung Hee Cheon,et al. An Analysis of Proxy Signatures: Is a Secure Channel Necessary? , 2003, CT-RSA.
[28] Kwangjo Kim,et al. Efficient ID-Based Blind Signature and Proxy Signature from Bilinear Pairings , 2003, ACISP.