-
1
-
-
33846070390
-
-
Camenisch, J., Group signature schemes and payment systems based on the discrete logarithm problem. ETH Series in Information Security and Cryptography, vol. 2, pp. 11-12.
-
-
-
-
2
-
-
0035451175
-
New nonrepudiable threshold proxy scheme with known signers
-
Hsu C., Wu T., and Wu T. New nonrepudiable threshold proxy scheme with known signers. The Journal of Systems and Software 58 (2001) 119-124
-
(2001)
The Journal of Systems and Software
, vol.58
, pp. 119-124
-
-
Hsu, C.1
Wu, T.2
Wu, T.3
-
3
-
-
33846038884
-
-
Hwang, S., Shi, C., 2000. A simple multi-proxy signature scheme. In: Proceedings of the 10th National Conference on Information Security, pp. 134-138.
-
-
-
-
4
-
-
0242410360
-
A practical (t, n) threshold proxy signature scheme based on the RSA cryptosystem
-
Hwang M.S., Lu J.L., and Lin L.C. A practical (t, n) threshold proxy signature scheme based on the RSA cryptosystem. IEEE Transactions on Knowledge and Data Engineering 15 6 (2003) 1552-1560
-
(2003)
IEEE Transactions on Knowledge and Data Engineering
, vol.15
, Issue.6
, pp. 1552-1560
-
-
Hwang, M.S.1
Lu, J.L.2
Lin, L.C.3
-
5
-
-
33846088016
-
-
Kim, S., Park, S., Won, D., 1997. Proxy signatures, revisited. In: Proceedings of ICICS'97, pp. 223-232.
-
-
-
-
6
-
-
35248866917
-
-
Lee, J.Y., Cheon, J.H., Kim, S., 2003. An Analysis of Proxy Signatures: Is a Secure Channel Necessary? In: CT-RSA 2003, pp. 68-79.
-
-
-
-
7
-
-
0030231965
-
-
Mambo, M., Usuda, K., Okamoto, E., 1996. Proxy signature: delegation of the power to sign messages, In: IEICE Trans. Fundamentals, E79-A, vol. 9, September, pp. 1338-1353.
-
-
-
-
8
-
-
84927727752
-
-
Pointecheval, D., Stern, J., 1996. Security proofs for signatures, In: Eurocrypt'96, LNCS, vol. 1070, pp. 387-398.
-
-
-
-
9
-
-
12344258539
-
Efficient signature generation by smart cards
-
Schnorr C.P. Efficient signature generation by smart cards. Journal of Cryptology 4 3 (1991) 161-174
-
(1991)
Journal of Cryptology
, vol.4
, Issue.3
, pp. 161-174
-
-
Schnorr, C.P.1
-
10
-
-
0345490608
-
-
Wang, H., Pieprzyk, J., 2003. Efficient one-time proxy signatures. In: ASIACRYPT 2003, pp. 507-522.
-
-
-
-
11
-
-
13844266307
-
Comments on a practical (t, n) threshold proxy signature scheme based on the RSA cryptosystem
-
Wang G., Bao F., Zhou J., and Deng R.H. Comments on a practical (t, n) threshold proxy signature scheme based on the RSA cryptosystem. IEEE Transactions on Knowledge and Data Engineering 16 10 (2004) 1309-1311
-
(2004)
IEEE Transactions on Knowledge and Data Engineering
, vol.16
, Issue.10
, pp. 1309-1311
-
-
Wang, G.1
Bao, F.2
Zhou, J.3
Deng, R.H.4
-
12
-
-
4444372561
-
On the efficiency of nonrepudiable threshold proxy signature scheme with known signers
-
Yang C.Y., Tzeng S.F., and Hwang M.S. On the efficiency of nonrepudiable threshold proxy signature scheme with known signers. The Journal of Systems and Software 73 (2004) 507-514
-
(2004)
The Journal of Systems and Software
, vol.73
, pp. 507-514
-
-
Yang, C.Y.1
Tzeng, S.F.2
Hwang, M.S.3
-
13
-
-
0033875604
-
A new type of proxy signature scheme
-
Yi L., Bai G., and Xiao G. A new type of proxy signature scheme. Electronics Letters 36 6 (2000) 527-528
-
(2000)
Electronics Letters
, vol.36
, Issue.6
, pp. 527-528
-
-
Yi, L.1
Bai, G.2
Xiao, G.3
-
14
-
-
33846076386
-
-
Zhang, K., 1997. Threshold proxy signature schemes. In: 1997 Information Security Workshop, pp. 191-197.
-
-
-
|