Formalized security model of multi-proxy signature schemes
暂无分享,去创建一个
Zhenfu Cao | Qin Wang | Shengbao Wang | Z. Cao | Shengbao Wang | Qin Wang
[1] Zhenfu Cao,et al. Security Arguments for Partial Delegation with Warrant Proxy Signature Schemes , 2004, IACR Cryptol. ePrint Arch..
[2] Eiji Okamoto,et al. Proxy signatures for delegating signing operation , 1996, CCS '96.
[3] Hovav Shacham,et al. Aggregate and Verifiably Encrypted Signatures from Bilinear Maps , 2003, EUROCRYPT.
[4] Dongho Won,et al. Proxy signatures, Revisited , 1997, ICICS.
[5] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[6] Zhenfu Cao,et al. Improvement of multi-proxy signature scheme , 2004, The Fourth International Conference onComputer and Information Technology, 2004. CIT '04..
[7] Tzong-Chen Wu,et al. Multi-proxy Signature Schemes for Partial Delegation with Cheater Identification , 2002 .