-
1
-
-
0030231965
-
Proxy signature: delegation of the power to sign messages
-
Mambo M., Usuda K., and Okamoto E. Proxy signature: delegation of the power to sign messages. IEICE Transactions on Fundamentals E79-A 9 (1996) 1338-1354
-
(1996)
IEICE Transactions on Fundamentals
, vol.E79-A
, Issue.9
, pp. 1338-1354
-
-
Mambo, M.1
Usuda, K.2
Okamoto, E.3
-
2
-
-
0010567510
-
Proxy signature, revisited
-
Springer-Verlag
-
Kim S., Park S., and Won D. Proxy signature, revisited. Proc. of ICICS'97, Int. Conf. Information and Communications Security, LNCS vol. 1334 (1997), Springer-Verlag 223-232
-
(1997)
Proc. of ICICS'97, Int. Conf. Information and Communications Security, LNCS
, vol.1334
, pp. 223-232
-
-
Kim, S.1
Park, S.2
Won, D.3
-
3
-
-
84958751721
-
Secure mobile agent using strong non-designated proxy signature
-
Springer-Verlag
-
Lee B., Kim H., and Won K. Secure mobile agent using strong non-designated proxy signature. Proc. of ACISP2001, LNCS vol. 2119 (2001), Springer-Verlag 474-486
-
(2001)
Proc. of ACISP2001, LNCS
, vol.2119
, pp. 474-486
-
-
Lee, B.1
Kim, H.2
Won, K.3
-
4
-
-
0344512405
-
Generalization of proxy signature based on elliptic curves
-
Hwang M., Tzeng S., and Tsai C. Generalization of proxy signature based on elliptic curves. Computer Standards & Interfaces 26 (2004) 73-84
-
(2004)
Computer Standards & Interfaces
, vol.26
, pp. 73-84
-
-
Hwang, M.1
Tzeng, S.2
Tsai, C.3
-
5
-
-
33744908066
-
A short proxy signature scheme: efficient authentication in the ubiquitous world
-
Springer-Verlag
-
Huang X., Mu Y., Susili W., and Zhang F. A short proxy signature scheme: efficient authentication in the ubiquitous world. Proc. of EUC Workshops 2005, LNCS vol. 3823 (2005), Springer-Verlag 480-489
-
(2005)
Proc. of EUC Workshops 2005, LNCS
, vol.3823
, pp. 480-489
-
-
Huang, X.1
Mu, Y.2
Susili, W.3
Zhang, F.4
-
6
-
-
33751417424
-
A novel proxy key generation protocol and its application
-
Hu X., and Huang S. A novel proxy key generation protocol and its application. Computer Standards & Interfaces 29 (2007) 191-195
-
(2007)
Computer Standards & Interfaces
, vol.29
, pp. 191-195
-
-
Hu, X.1
Huang, S.2
-
8
-
-
0033875604
-
Proxy multi-signature scheme: a new type of proxy signature scheme
-
Yi L., Bai G., and Xiao G. Proxy multi-signature scheme: a new type of proxy signature scheme. Electronic Letters 36 6 (2000) 527-528
-
(2000)
Electronic Letters
, vol.36
, Issue.6
, pp. 527-528
-
-
Yi, L.1
Bai, G.2
Xiao, G.3
-
10
-
-
4043112629
-
Improvement of threshold proxy signature scheme
-
Shao Z. Improvement of threshold proxy signature scheme. Computer Standards & Interfaces 27 (2004) 53-59
-
(2004)
Computer Standards & Interfaces
, vol.27
, pp. 53-59
-
-
Shao, Z.1
-
11
-
-
54349105888
-
Cryptanalysis and improvement of a threshold proxy signature scheme
-
10.1016/j.csi.2007.11.002
-
Hu J., and Zhang J. Cryptanalysis and improvement of a threshold proxy signature scheme. Computer Standards & Interfaces (2008) 10.1016/j.csi.2007.11.002
-
(2008)
Computer Standards & Interfaces
-
-
Hu, J.1
Zhang, J.2
-
12
-
-
54349116468
-
Secure multiple-times proxy signature scheme
-
10.1016/j.csi.2007.10.005
-
Hong X., and Chen K. Secure multiple-times proxy signature scheme. Computer Standards & Interfaces (2007) 10.1016/j.csi.2007.10.005
-
(2007)
Computer Standards & Interfaces
-
-
Hong, X.1
Chen, K.2
-
14
-
-
10644262979
-
The security of a strong proxy signature scheme with proxy signer privacy protection
-
Lee N., and Lee M. The security of a strong proxy signature scheme with proxy signer privacy protection. Applied Mathematics and Computation 161 (2005) 807-812
-
(2005)
Applied Mathematics and Computation
, vol.161
, pp. 807-812
-
-
Lee, N.1
Lee, M.2
-
15
-
-
55749109607
-
-
F. Zhang, R. Safavi-Naini, C. Lin, New proxy signature, proxy blind signature and proxy ring signature schemes from bilinear pairings, Cryptology eprint archive, 2003/104, 2003. http://eprint.iacr.org.
-
F. Zhang, R. Safavi-Naini, C. Lin, New proxy signature, proxy blind signature and proxy ring signature schemes from bilinear pairings, Cryptology eprint archive, 2003/104, 2003. http://eprint.iacr.org.
-
-
-
-
16
-
-
38349022736
-
Some new proxy signature schemes from bilinear pairings, progress on cryptography: 25 years of cryptography in China
-
Zhang F., Safavi-Naini R., and Lin C. Some new proxy signature schemes from bilinear pairings, progress on cryptography: 25 years of cryptography in China. Kluwer International Series in Engineering and Computer Science vol. 769 (2004) 59-66
-
(2004)
Kluwer International Series in Engineering and Computer Science
, vol.769
, pp. 59-66
-
-
Zhang, F.1
Safavi-Naini, R.2
Lin, C.3
-
17
-
-
84946840347
-
Short signature from the Weil pairing
-
Springer-Verlag
-
Boneh D., Lynn B., and Shacham H. Short signature from the Weil pairing. Proc. of Asiacrypt2001, LNCS vol. 2248 (2001), Springer-Verlag 514-532
-
(2001)
Proc. of Asiacrypt2001, LNCS
, vol.2248
, pp. 514-532
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
18
-
-
21144441197
-
Aggregate and verifiably encrypted from bilinear maps
-
Springer-Verlag
-
Boneh D., Gentry G., Lynn B., and Shacham H. Aggregate and verifiably encrypted from bilinear maps. Proc. of Eurocrypt2003, LNCS vol. 2656 (2003), Springer-Verlag 272-293
-
(2003)
Proc. of Eurocrypt2003, LNCS
, vol.2656
, pp. 272-293
-
-
Boneh, D.1
Gentry, G.2
Lynn, B.3
Shacham, H.4
-
19
-
-
84958765355
-
ID-based blind signature and ring signature from pairings
-
Springer-Verlag
-
Zhang F., and Kim K. ID-based blind signature and ring signature from pairings. Proc of Asiacrypt02, LNCS vol. 2501 (2002), Springer-Verlag 533-547
-
(2002)
Proc of Asiacrypt02, LNCS
, vol.2501
, pp. 533-547
-
-
Zhang, F.1
Kim, K.2
-
20
-
-
0027726717
-
Random oracles are practical: a paradigm for designing efficient protocols
-
ACM press, New York
-
Bellare M., and Rogaway P. Random oracles are practical: a paradigm for designing efficient protocols. Proc. of the 1st CCS (1993), ACM press, New York 62-73
-
(1993)
Proc. of the 1st CCS
, pp. 62-73
-
-
Bellare, M.1
Rogaway, P.2
-
21
-
-
0000901529
-
Security arguments for digital signature and blind signature
-
Pointcheval D., and Stern J. Security arguments for digital signature and blind signature. Journal of Cryptology 13 3 (2000) 361-396
-
(2000)
Journal of Cryptology
, vol.13
, Issue.3
, pp. 361-396
-
-
Pointcheval, D.1
Stern, J.2
-
22
-
-
84946833891
-
How to leak a secret
-
Springer-Verlag
-
Rivest R., Shamir A., and Taumam Y. How to leak a secret. Proc. of Asiacrypt2001, LNCS vol. 2248 (2001), Springer-Verlag 552-565
-
(2001)
Proc. of Asiacrypt2001, LNCS
, vol.2248
, pp. 552-565
-
-
Rivest, R.1
Shamir, A.2
Taumam, Y.3
-
23
-
-
84880373553
-
Proxy signature without random oracles
-
Huang X., Mu Y., Susilo W., and Wu W. Proxy signature without random oracles. Proc. of MSN 2006, LNCS vol. 4325 (2006) 473-484
-
(2006)
Proc. of MSN 2006, LNCS
, vol.4325
, pp. 473-484
-
-
Huang, X.1
Mu, Y.2
Susilo, W.3
Wu, W.4
-
24
-
-
55749096643
-
Secure proxy signature in the standard model
-
10.1016/j.csi.2008.01.001
-
Cao F., and Cao Z. Secure proxy signature in the standard model. Computer Standards & Interfaces (2008) 10.1016/j.csi.2008.01.001
-
(2008)
Computer Standards & Interfaces
-
-
Cao, F.1
Cao, Z.2
|