-
1
-
-
0030231965
-
Proxy signatures: Delegation of the power to sign messages
-
M. Mambo, K. Usuda, and E. Okmamoto Proxy signatures: delegation of the power to sign messages IEICE Trans. Functional E79-A 9 1996 1338 1353
-
(1996)
IEICE Trans. Functional
, vol.E79-A
, Issue.9
, pp. 1338-1353
-
-
Mambo, M.1
Usuda, K.2
Okmamoto, E.3
-
2
-
-
0029717329
-
Proxy signatures for delegation signing operation
-
New Delhi, India, January
-
M. Mambo, K. Usuda, E. Okmamoto, Proxy signatures for delegation signing operation, in: Proceedings of the Third ACM Conference on Computer and Communication Security, New Delhi, India, January 1996, pp. 48-57
-
(1996)
Proceedings of the Third ACM Conference on Computer and Communication Security
, pp. 48-57
-
-
Mambo, M.1
Usuda, K.2
Okmamoto, E.3
-
3
-
-
0000064722
-
Threshold proxy signature schemes
-
Japan, September
-
H. Zhang, Threshold proxy signature schemes, 1997 Information Security Workshop, Japan, September 1997, pp. 191-197
-
(1997)
1997 Information Security Workshop
, pp. 191-197
-
-
Zhang, H.1
-
4
-
-
0032670844
-
An efficient nonrepudiable threshold proxy signature scheme with known signers
-
H.-M. Sun An efficient nonrepudiable threshold proxy signature scheme with known signers Computer Communications 22 1999 717 722
-
(1999)
Computer Communications
, vol.22
, pp. 717-722
-
-
Sun, H.-M.1
-
6
-
-
0035451175
-
New nonrepudiable threshold proxy signature scheme wit known signers
-
C.-L. Hsu, T.-S. Wu, and T.-C. Wu New nonrepudiable threshold proxy signature scheme wit known signers The Journal of System and Software 58 2001 119 124
-
(2001)
The Journal of System and Software
, vol.58
, pp. 119-124
-
-
Hsu, C.-L.1
Wu, T.-S.2
Wu, T.-C.3
-
7
-
-
0141518230
-
A secure nonrepudiable threshold proxy signature scheme with known signers
-
M.-S. Hwang, L.-C. Lin, and J.-L.L.U. Eric A secure nonrepudiable threshold proxy signature scheme with known signers Information 11 2 2000 137 144
-
(2000)
Information
, vol.11
, Issue.2
, pp. 137-144
-
-
Hwang, M.-S.1
Lin, L.-C.2
Eric, J.-L.L.U.3
-
8
-
-
0141555798
-
A simple multi-proxy signature scheme
-
Hualien, Taiwan, ROC
-
S.J. Hwang, C.-H. Shi, A simple multi-proxy signature scheme, in: Proceedings of the Tenth National Conference on Information Security, Hualien, Taiwan, ROC, 2000, pp. 134-138
-
(2000)
Proceedings of the Tenth National Conference on Information Security
, pp. 134-138
-
-
Hwang, S.J.1
Shi, C.-H.2
-
9
-
-
0033875604
-
Proxy multi-signature scheme: A new type of proxy signature scheme
-
L. Yi, G. Bai, and G. Xiao Proxy multi-signature scheme: a new type of proxy signature scheme Electronics Letter 36 6 2000 527 528
-
(2000)
Electronics Letter
, vol.36
, Issue.6
, pp. 527-528
-
-
Yi, L.1
Bai, G.2
Xiao, G.3
-
10
-
-
0010533609
-
The specifiable proxy signature
-
Taipei, Taiwan, ROC, December
-
S.J. Hwang, C.-H. Shi, The specifiable proxy signature, National Computer symposium 1999, Taipei, Taiwan, ROC, December 1999, pp. 190-197
-
(1999)
National Computer Symposium 1999
, pp. 190-197
-
-
Hwang, S.J.1
Shi, C.-H.2
-
11
-
-
0010568133
-
Time-stamp proxy signatures with traceable receivers
-
Taichung, Taiwan, ROC
-
H.-M. Sun, B.-T. Hsieh, Time-stamp proxy signatures with traceable receivers, Proceedings of the Ninth National Conference on Information Security, Taichung, Taiwan, ROC, 1999, pp. 247-253
-
(1999)
Proceedings of the Ninth National Conference on Information Security
, pp. 247-253
-
-
Sun, H.-M.1
Hsieh, B.-T.2
-
13
-
-
0035416443
-
A threshold key escrow scheme based on public key cryptosystem
-
Z. Cao A threshold key escrow scheme based on public key cryptosystem Science in China (Series E) 44 4 2001 441 448
-
(2001)
Science in China (Series E)
, vol.44
, Issue.4
, pp. 441-448
-
-
Cao, Z.1
-
14
-
-
0141719369
-
Two classes of robust threshold key escrow schemes
-
Z. Cao Two classes of robust threshold key escrow schemes Journal of Software 14 6 2003 1164 1171
-
(2003)
Journal of Software
, vol.14
, Issue.6
, pp. 1164-1171
-
-
Cao, Z.1
-
15
-
-
84948954277
-
Practical threshold signatures
-
Springer-Verlag
-
V. Shoup Practical threshold signatures Eurocrypt'2000 LNCS 1807 2000 Springer-Verlag 207 220 http://www.shoup.net/papers
-
(2000)
Eurocrypt'2000 LNCS
, vol.1807
, pp. 207-220
-
-
Shoup, V.1
-
16
-
-
4243114091
-
Efficient generation of shared RSA keys
-
D. Boneh, and M. Franklin Efficient generation of shared RSA keys Journal of the ACM 48 4 2001 702 722
-
(2001)
Journal of the ACM
, vol.48
, Issue.4
, pp. 702-722
-
-
Boneh, D.1
Franklin, M.2
-
17
-
-
0036758977
-
Improvement of Shoup's threshold RSA signature scheme 405
-
G. Wang, S. Qing, and M. Wang Improvement of Shoup's threshold RSA signature scheme 405 Computer Research and Development 39 9 2002 1046 1050 (in Chinese)
-
(2002)
Computer Research and Development
, vol.39
, Issue.9
, pp. 1046-1050
-
-
Wang, G.1
Qing, S.2
Wang, M.3
-
18
-
-
84956979177
-
Threshold undeniable RSA signature schemes
-
Information and Communications Security (ICICS 2001) S. Qing T. Okamoto J. Zhou Springer-Verlag Berlin
-
G. Wang, S. Qing, M. Wang, and Z. Zhou Threshold undeniable RSA signature schemes S. Qing T. Okamoto J. Zhou Information and Communications Security (ICICS 2001) LNCS 2229 2001 Springer-Verlag Berlin 221 232
-
(2001)
LNCS
, vol.2229
, pp. 221-232
-
-
Wang, G.1
Qing, S.2
Wang, M.3
Zhou, Z.4
-
19
-
-
84947906522
-
The exact security of digital signatures - How to sign with RSA and Rabin
-
Proceedings of Eurocrypt 1996, May 1996 U. Maurer Springer-Verlag
-
M. Bellare, and P. Rogaway The exact security of digital signatures - how to sign with RSA and Rabin U. Maurer Proceedings of Eurocrypt 1996, May 1996 LNCS 1070 1996 Springer-Verlag 399 416
-
(1996)
LNCS
, vol.1070
, pp. 399-416
-
-
Bellare, M.1
Rogaway, P.2
|