Cryptanalysis of the Hwang-Shi Proxy Signature Scheme
暂无分享,去创建一个
[1] William Stallings,et al. Cryptography and network security , 1998 .
[2] Guoqiang Bai,et al. Proxy multi-signature scheme: a new type of proxy signature scheme , 2000 .
[3] Min-Shiang Hwang,et al. A Secure Nonrepudiable Threshold Proxy Signature Scheme with Known Signers , 2000, Informatica.
[4] Min-Shiang Hwang,et al. A Dynamic Key Generation Scheme for Access Control in a Hierarchy , 1999, Nord. J. Comput..
[5] M. Mambo,et al. Proxy Signatures: Delegation of the Power to Sign Messages (Special Section on Information Theory and Its Applications) , 1996 .
[6] Dongho Won,et al. Proxy signatures, Revisited , 1997, ICICS.
[7] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[8] Min-Shiang Hwang. An asymmetric cryptographuic key assignment scheme for access control in totally-ordered hierarchies , 2000, Int. J. Comput. Math..
[9] Tzonelih Hwang,et al. On Zhang's Nonrepudiable Proxy Signature Schemes , 1998, ACISP.
[10] Wei-Pang Yang,et al. A new dynamic cryptographic key generation scheme for a hierarchy , 1994, Proceedings of TENCON'94 - 1994 IEEE Region 10's 9th Annual International Conference on: 'Frontiers of Computer Technology'.