-
1
-
-
0030231965
-
-
pp. 1338-1354
-
MAMBO, M., USUDA, K., and OKAMOTO, E.: 'Proxy signatures: Delegation of the power to sign messages', IEICE Trans. Fundam., 1996, E79-A, (9), pp. 1338-1354
-
USUDA, K., and OKAMOTO, E.: 'Proxy Signatures: Delegation of the Power to Sign Messages', IEICE Trans. Fundam., 1996, E79-A, (9)
-
-
Mambo, M.1
-
2
-
-
0029717329
-
-
pp. 48-57
-
MAMBO, M., USUDA, K., and OKAMOTO, E.: 'Proxy signatures for delegating signing operation', Proc. 3rd ACM Conference on Computer and Communications Security (ACM press, 1996) pp. 48-57
-
USUDA, K., and OKAMOTO, E.: 'Proxy Signatures for Delegating Signing Operation', Proc. 3rd ACM Conference on Computer and Communications Security (ACM Press, 1996)
-
-
Mambo, M.1
-
3
-
-
0029752886
-
-
pp. 94-101
-
USUDA, K., MAMBO, M., UYEMATSU, T., and OKAMOTO, E.: 'Proposal of an automatic signature scheme using a complier', IEICE Trans. Fundamentals, 1996, E79-A, (1), pp. 94-101
-
MAMBO, M., UYEMATSU, T., and OKAMOTO, E.: 'Proposal of an Automatic Signature Scheme Using a Complier', IEICE Trans. Fundamentals, 1996, E79-A, (1)
-
-
Usuda, K.1
-
4
-
-
0026156775
-
-
pp. 255-275
-
VARADHARAJAN, V, ALLEN, P., and BLACK, S.: 'An analysis of the proxy problem in distributed systems', Proc. 1991 IEEE Computer Society Symposium on Research in Security and Privacy', (1991), pp. 255-275
-
ALLEN, P., and BLACK, S.: 'An Analysis of the Proxy Problem in Distributed Systems', Proc. 1991 IEEE Computer Society Symposium on Research in Security and Privacy', (1991)
-
-
Varadharajan, V.1
-
6
-
-
33749927056
-
-
pp. 223-232
-
KIM, S., PARK, S., and WON, D.: 'Proxy signatures, revisited', ICICS'97, Lecture Notes in Computer Science 1334 (Springer-Verlag 1997) pp. 223-232
-
PARK, S., and WON, D.: 'Proxy Signatures, Revisited', ICICS'97, Lecture Notes in Computer Science 1334 (Springer-Verlag 1997)
-
-
Kim, S.1
-
7
-
-
33749921064
-
-
pp. 191-197
-
ZHANG, K.: 'Threshold proxy signature schemes', 1997 Information Security Workshop, Sep., 1997, Japan, pp. 191-197
-
'Threshold Proxy Signature Schemes', 1997 Information Security Workshop, Sep., 1997, Japan
-
-
Zhang, K.1
-
8
-
-
84956860632
-
-
pp. 415-422
-
LEE, N.Y., HWANG, T., and WANG, C.H.: 'On Zhang's nonrepudiable proxy signature schemes', ACISP'98, Lecture Notes in Computer Science 1438 (Springer-Verlag 1998), pp. 415-422
-
HWANG, T., and WANG, C.H.: 'On Zhang's Nonrepudiable Proxy Signature Schemes', ACISP'98, Lecture Notes in Computer Science 1438 (Springer-Verlag 1998)
-
-
Lee, N.Y.1
-
10
-
-
0028508211
-
-
pp. 307-313
-
HARN, L.: 'Group-oriented (t, n) threshold digital signature scheme and digital multisignature', IEEProc.-Comput. Digit. Tech., 1994, 141, (5), pp. 307-313
-
'Group-oriented (T, N) Threshold Digital Signature Scheme and Digital Multisignature', IEEProc.-Comput. Digit. Tech., 1994, 141, (5)
-
-
Harn, L.1
-
12
-
-
33749875418
-
-
pp. 191-200
-
LI, C., HWANG, T., and LEE, N.Y.: '(t, n)-threshold signature scheme based on discrete logarithm', Advances in Cryptology -Eurocrypt'94 Proceedings (Springer-Verlag 1995), pp. 191-200
-
HWANG, T., and LEE, N.Y.: '(T, N)-threshold Signature Scheme Based on Discrete Logarithm', Advances in Cryptology -Eurocrypt'94 Proceedings (Springer-Verlag 1995)
-
-
Li, C.1
-
14
-
-
0018545449
-
-
pp. 612-613
-
SHAMIR, A.: 'How to share a secret', Com/mm, of the ACM, 1979, 22, (11), pp. 612-613
-
'How to Share a Secret', Com/mm, of the ACM, 1979, 22, (11)
-
-
Shamir, A.1
-
16
-
-
84874800178
-
-
pp. 469-472
-
ELGAMAL, T.: 'A public key cryptosystem and signature scheme based on discrete logarithms', IEEE Trans. Info. Theory, 1985, 31, (4), pp. 469-472
-
'A Public Key Cryptosystem and Signature Scheme Based on Discrete Logarithms', IEEE Trans. Info. Theory, 1985, 31, (4)
-
-
Elgamal, T.1
-
18
-
-
84957797281
-
-
pp. 96-107
-
HORSTER, P., MICHELS, M., and PETERSEN, H.: 'Meta-ElGamal signature schemes', Proc. 2nd ACM Conference on Computer and Communications Security (ACM press, 1994) pp. 96-107
-
MICHELS, M., and PETERSEN, H.: 'Meta-ElGamal Signature Schemes', Proc. 2nd ACM Conference on Computer and Communications Security (ACM Press, 1994)
-
-
Horster, P.1
-
20
-
-
0028549045
-
-
141, (6)
-
YEN, S.-M., LAIH, C.-S., and LENSTRA, A.K.: 'Multi-exponentiation', IEE Proc.-Comput. Digit. Tech., 1994, 141, (6),
-
LAIH, C.-S., and LENSTRA, A.K.: 'Multi-exponentiation', IEE Proc.-Comput. Digit. Tech., 1994
-
-
Yen, S.-M.1
|