-
1
-
-
0030231965
-
Proxy signatures: Delegation of the power to sign messages
-
Mambo M., Usuda K., Okamoto E. Proxy signatures: Delegation of the power to sign messages. IEICE Trans. Fundam. E79-A:(9):1996;1338-1354.
-
(1996)
IEICE Trans. Fundam.
, vol.E79-A
, Issue.9
, pp. 1338-1354
-
-
Mambo, M.1
Usuda, K.2
Okamoto, E.3
-
2
-
-
0029717329
-
Proxy signatures for delegating signing operation
-
New Dehli, India, New York: ACM Press
-
Mambo M., Usuda K., Okamoto E. Proxy signatures for delegating signing operation. Proc. 3rd ACM Conference on Computer and Communications Security, New Dehli, India. 1996;48-57 ACM Press, New York.
-
(1996)
Proc. 3rd ACM Conference on Computer and Communications Security
, pp. 48-57
-
-
Mambo, M.1
Usuda, K.2
Okamoto, E.3
-
4
-
-
0017018484
-
New directions in cryptography
-
Diffie W., Hellman M.E. New directions in cryptography. IEEE Trans. IT-22:1976;644-654.
-
(1976)
IEEE Trans.
, vol.IT-22
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.E.2
-
5
-
-
0017930809
-
A method for obtain digital signatures and public-key cryptosystem
-
Rivest R.L., Shamir A., Adelman L. A method for obtain digital signatures and public-key cryptosystem. Comm. ACM. 21:(2):1978;120-126.
-
(1978)
Comm. ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adelman, L.3
-
6
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
ElGamal T. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. IT-31:1985;469-472.
-
(1985)
IEEE Trans.
, vol.IT-31
, pp. 469-472
-
-
ElGamal, T.1
-
8
-
-
0032670844
-
An efficient nonrepudiable threshold proxy signature scheme with known signers
-
Sun H.-M. An efficient nonrepudiable threshold proxy signature scheme with known signers. Comput. Comm. 22:1999;717-722.
-
(1999)
Comput. Comm.
, vol.22
, pp. 717-722
-
-
Sun, H.-M.1
-
9
-
-
0034313266
-
Design of time-stamped proxy signatures with traceable receivers
-
Sun H.-M. Design of time-stamped proxy signatures with traceable receivers. IEE Proc. - Comput. Digit. Tech. 147:(6):2000;462-466.
-
(2000)
IEE Proc. - Comput. Digit. Tech.
, vol.147
, Issue.6
, pp. 462-466
-
-
Sun, H.-M.1
-
10
-
-
0000064722
-
Threshold proxy signature schemes
-
Japan, September
-
Zhang K. Threshold proxy signature schemes. 1997 Information Security Workshop, Japan. September 1997;191-197.
-
(1997)
1997 Information Security Workshop
, pp. 191-197
-
-
Zhang, K.1
-
11
-
-
0010567510
-
Proxy signatures, revisited
-
ICICS'97, Berlin: Springer
-
Kim S., Park S., Won D. Proxy signatures, revisited. ICICS'97. Lecture Notes in Comput. Sci. 1334:1997;223-232 Springer, Berlin.
-
(1997)
Lecture Notes in Comput. Sci.
, vol.1334
, pp. 223-232
-
-
Kim, S.1
Park, S.2
Won, D.3
-
12
-
-
0033875604
-
A new type of proxy signature scheme
-
Yi L., Bai G., Xiao G. A new type of proxy signature scheme. Electron. Lett. 36:(6):2000;527-528.
-
(2000)
Electron. Lett.
, vol.36
, Issue.6
, pp. 527-528
-
-
Yi, L.1
Bai, G.2
Xiao, G.3
-
13
-
-
84947558992
-
A 'paradoxical' identity-based signature scheme resulting from zero-knowledge
-
Berlin: Springer
-
Guillou L.G., Quisquater J.-J. A 'paradoxical' identity-based signature scheme resulting from zero-knowledge. Advances in Cryptology - CRYPTO'88 Proceedings. 1990;216-231 Springer, Berlin.
-
(1990)
Advances in Cryptology - CRYPTO'88 Proceedings
, pp. 216-231
-
-
Guillou, L.G.1
Quisquater, J.-J.2
-
14
-
-
0034471216
-
Anonymous public-key certificates for anonymous and fair document exchange
-
Zhang N., Shi Q., Merabti M. Anonymous public-key certificates for anonymous and fair document exchange. IEE Proc. - Comput. Digit. Tech. 147:(6):2000;345-350.
-
(2000)
IEE Proc. - Comput. Digit. Tech.
, vol.147
, Issue.6
, pp. 345-350
-
-
Zhang, N.1
Shi, Q.2
Merabti, M.3
|