A Secure Nonrepudiable Threshold Proxy Signature Scheme with Known Signers
暂无分享,去创建一个
[1] Kan Zhang,et al. Threshold Proxy Signature Schemes , 1997, ISW.
[2] Dorothy E. Denning,et al. Cryptography and Data Security , 1982 .
[3] Torben P. Pedersen. A Threshold Cryptosystem without a Trusted Party (Extended Abstract) , 1991, EUROCRYPT.
[4] G. R. BLAKLEY. Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[5] Eiji Okamoto,et al. Proxy signatures for delegating signing operation , 1996, CCS '96.
[6] Torben P. Pedersen. Distributed Provers with Applications to Undeniable Signatures , 1991, EUROCRYPT.
[7] M. Mambo,et al. Proxy Signatures: Delegation of the Power to Sign Messages (Special Section on Information Theory and Its Applications) , 1996 .
[8] Hung-Min Sun,et al. An efficient nonrepudiable threshold proxy signature scheme with known signers , 1999, Comput. Commun..
[9] Eiji Okamoto,et al. Proposal of an Automatic Signature Scheme Using a Compiler (Special Section on Cryptography and Information Security) , 1996 .
[10] Tzonelih Hwang,et al. On Zhang's Nonrepudiable Proxy Signature Schemes , 1998, ACISP.
[11] Dongho Won,et al. Proxy signatures, Revisited , 1997, ICICS.
[12] Adi Shamir,et al. How to share a secret , 1979, CACM.