Designated verifier proxy signature scheme with message recovery
暂无分享,去创建一个
[1] Min-Shiang Hwang,et al. A Secure Nonrepudiable Threshold Proxy Signature Scheme with Known Signers , 2000, Informatica.
[2] Jacques Stern,et al. Security Proofs for Signature Schemes , 1996, EUROCRYPT.
[3] Zhenfu Cao,et al. A robust (k, n) + 1 threshold proxy signature scheme based on factoring , 2005, Appl. Math. Comput..
[4] M. Mambo,et al. Proxy Signatures: Delegation of the Power to Sign Messages (Special Section on Information Theory and Its Applications) , 1996 .
[5] Guilin Wang,et al. Designated-verifier proxy signatures for e-commerce , 2004, 2004 IEEE International Conference on Multimedia and Expo (ICME) (IEEE Cat. No.04TH8763).
[6] Guoqiang Bai,et al. Proxy multi-signature scheme: a new type of proxy signature scheme , 2000 .
[7] Tzong-Chen Wu,et al. New nonrepudiable threshold proxy signature scheme with known signers , 2001, J. Syst. Softw..
[8] Hung-Min Sun,et al. Threshold proxy signatures , 1999 .
[9] Hwang Shin-Jia,et al. New multi-proxy multi-signature schemes , 2004 .
[10] Alfred Menezes,et al. The State of Elliptic Curve Cryptography , 2000, Des. Codes Cryptogr..
[11] Eiji Okamoto,et al. Proxy signatures for delegating signing operation , 1996, CCS '96.
[12] Xiaohu Yang,et al. Designated-receiver proxy signature scheme for electronic commerce , 2003, SMC'03 Conference Proceedings. 2003 IEEE International Conference on Systems, Man and Cybernetics. Conference Theme - System Security and Assurance (Cat. No.03CH37483).
[13] Ji Jia. A New Proxy Multi-Signature Scheme , 2004 .
[14] Chien-Lung Hsu,et al. New proxy multi-signature scheme , 2005, Appl. Math. Comput..
[15] R Lu. A simple efficient proxy-protected signature scheme based on factoring , 2004 .
[16] Claus-Peter Schnorr,et al. Efficient signature generation by smart cards , 2004, Journal of Cryptology.
[17] Zuhua Shao,et al. Proxy signature schemes based on factoring , 2003, Inf. Process. Lett..