-
1
-
-
0030231965
-
Proxy signatures: Delegation of the power to sign messages
-
Mambo M, Usuda K, Okamoto E. Proxy signatures: Delegation of the power to sign messages. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. 1996, E79-A(9): 1338-1353.
-
(1996)
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
, vol.E79-A
, Issue.9
, pp. 1338-1353
-
-
Moambo, M.1
Usuda, K.2
Okamoto, E.3
-
2
-
-
84958751721
-
Secure mobile agent using strong non-designated proxy signature
-
Varadharajan V. and Mu Y.(ed.), LNCS 2119, Berlin: Springer-Verlag
-
Lee B, Kim H, Kim K. Secure mobile agent using strong non-designated proxy signature. In: Varadharajan V, Mu Y, eds. Proceedings of the ACISP2001. LNCS 2119, Berlin: Springer-Verlag, 2001, 474-486.
-
(2001)
Proceedings of the ACISP2001
, pp. 474-486
-
-
Lee, B.1
Kim, H.2
Kim, K.3
-
4
-
-
0010567510
-
Proxy signatures, revisited
-
Han Y.(ed.), Berlin: Springer-Verlag
-
Kim S, Park S, Won D. Proxy signatures, revisited. In Han Y, et al. eds. Proceedings of the ICICS'97 International Conference on Information and Communications Security LNCS 1334, Berlin: Springer-Verlag, 1997, 223-232.
-
(1997)
Proceedings of the ICICS'97 International Conference on Information and Communications Security LNCS 1334
, pp. 223-232
-
-
Kim, S.1
Park, S.2
Won, D.3
-
5
-
-
0033354258
-
Threshold proxy signatures
-
Sun H M, Lee N Y, Hwang T. Threshold proxy signatures. IEE Proc.-Computers and Digital Techniques, 1999, 146(5): 259-263.
-
(1999)
IEE Proc.-Computers and Digital Techniques
, vol.146
, Issue.5
, pp. 259-263
-
-
Sun, H.M.1
Lee, N.Y.2
Hwang, T.3
-
6
-
-
0032670844
-
An efficient nonrepudiable threshold proxy signature scheme with known signers
-
Sun H M. An efficient nonrepudiable threshold proxy signature scheme with known signers. Computer Communications, 1999, 22(8): 717-722.
-
(1999)
Computer Communications
, vol.22
, Issue.8
, pp. 717-722
-
-
Sun, H.M.1
-
7
-
-
0141518230
-
A secure nonrepudiable threshold proxy signature scheme with known signers
-
Hwang M S, Lin I C, Lu E J L. A secure nonrepudiable threshold proxy signature scheme with known signers. International Journal of Informatica, 2000, 11(2): 1-8.
-
(2000)
International Journal of Informatica
, vol.11
, Issue.2
, pp. 1-8
-
-
Hwang, M.S.1
Lin, I.C.2
Lu, E.J.L.3
-
8
-
-
0034313266
-
Design of time-stamped proxy signatures with traceable receivers
-
Sun H M. Design of time-stamped proxy signatures with traceable receivers. IEE Proc.-Computers and Digital Techniques, 2000, 147(6): 462-466.
-
(2000)
IEE Proc.-Computers and Digital Techniques
, vol.147
, Issue.6
, pp. 462-466
-
-
Sun, H.M.1
-
9
-
-
0035451175
-
New nonrepudiable threshold proxy signature scheme with known signers
-
Hsu C L, Wu T S, Wu T C. New nonrepudiable threshold proxy signature scheme with known signers. The Journal of Systems and Software, 2001, 58(2): 119-124.
-
(2001)
The Journal of Systems and Software
, vol.58
, Issue.2
, pp. 119-124
-
-
Hsu, C.L.1
Wu, T.S.2
Wu, T.C.3
-
10
-
-
0033875604
-
Proxy multi-signature scheme: A new type of proxy signature scheme
-
Yi L J, Bai G Q, Xiao G Z. Proxy multi-signature scheme: A new type of proxy signature scheme. Electronics Letters, 2000, 36(6): 527-528.
-
(2000)
Electronics Letters
, vol.36
, Issue.6
, pp. 527-528
-
-
Yi, L.J.1
Bai, G.Q.2
Xiao, G.Z.3
-
11
-
-
0036622078
-
Improvement of M-U-O and K-P-W proxy signature schemes
-
Li J G, Cao Z F, Zhang Y C. Improvement of M-U-O and K-P-W proxy signature schemes. Journal of Harbin Institute of Technology, 2002, 9(2): 145-148.
-
(2002)
Journal of Harbin Institute of Technology
, vol.9
, Issue.2
, pp. 145-148
-
-
Li, J.G.1
Cao, Z.F.2
Zhang, Y.C.3
-
12
-
-
0036864802
-
Improvement of a threshold proxy signature scheme
-
Chinese source
-
Li J G, Cao Z F. Improvement of a threshold proxy signature scheme. Journal of Computer Research and Development, 2002, 39(11): 1513-1518 (in Chinese with English abstract)
-
(2002)
Journal of Computer Research and Development
, vol.39
, Issue.11
, pp. 1513-1518
-
-
Li, J.G.1
Cao, Z.F.2
-
13
-
-
0038358035
-
Cryptographic analysis and modification of proxy multi signature scheme
-
Chinese source
-
Li J G, Cao Z F, Zhang Y C, Li J Z. Cryptographic analysis and modification of proxy multi signature scheme. High Technology Letters, 2003, 13(4): 1-5 (in Chinese with English abstract)
-
(2003)
High Technology Letters
, vol.13
, Issue.4
, pp. 1-5
-
-
Li, J.G.1
Cao, Z.F.2
Zhang, Y.C.3
Li, J.Z.4
-
14
-
-
0038285601
-
Nonrepudiable proxy multi-signature scheme
-
Li J G, Cao Z F, Zhang Y C. Nonrepudiable proxy multi-signature scheme. Journal of Computer Science and Technology, 2003, 18(3): 399-402.
-
(2003)
Journal of Computer Science and Technology
, vol.18
, Issue.3
, pp. 399-402
-
-
Li, J.G.1
Cao, Z.F.2
Zhang, Y.C.3
-
15
-
-
20244388769
-
An efficient scheme for secure message transmission using proxy-signcryption
-
Edwards J.(ed.), Auckland: Springer-Verlag
-
Gamage C, Leiwo J, Zheng Y. An efficient scheme for secure message transmission using proxy-signcryption. In: Edwards J, ed. Proceedings of the 22th Australasian Computer Science. Auckland: Springer-Verlag, 1999, 420-431.
-
(1999)
Proceedings of the 22th Australasian Computer Science
, pp. 420-431
-
-
Gamage, C.1
Leiwo, J.2
Zheng, Y.3
-
17
-
-
85030460443
-
A threshold cryptosystem without a trusted party
-
Davies D.W.(ed.), LNCS 547, Brighton: Springer-Verlag
-
Pedersen T P. A threshold cryptosystem without a trusted party. In: Davies D W, ed. Proceedings of the Advances in Cryptology-Eurocrypf 91. LNCS 547, Brighton: Springer-Verlag, 1991, 552-526.
-
(1991)
Proceedings of the Advances in Cryptology-Eurocrypf 91
, pp. 552-526
-
-
Pedersen, T.P.1
|