-
1
-
-
0242410360
-
A practical (t, n) threshold proxy signature scheme based on the RSA cryptosystem
-
M. S. Hwang, J. L. Lu and I. C. Lin, A practical (t, n) threshold proxy signature scheme based on the RSA cryptosystem, IEEE Transactions on Knowledge and Data Engineering, vol. 15, no.6, pp.1552-1560, 2003.
-
(2003)
IEEE Transactions on Knowledge and Data Engineering
, vol.15
, Issue.6
, pp. 1552-1560
-
-
Hwang, M.S.1
Lu, J.L.2
Lin, I.C.3
-
2
-
-
13844266307
-
Comments on a practical (t, n) threshold proxy signature scheme based on the RSA cryptosystem
-
G. Wang, F. Bao, J. Zhou and R. H. Deng, Comments on a practical (t, n) threshold proxy signature scheme based on the RSA cryptosystem, IEEE Transactions on Knowledge and Data Engineering, vol.16, no.10, pp.1309-1311, 2004.
-
(2004)
IEEE Transactions on Knowledge and Data Engineering
, vol.16
, Issue.10
, pp. 1309-1311
-
-
Wang, G.1
Bao, F.2
Zhou, J.3
Deng, R.H.4
-
3
-
-
0030231965
-
Proxy signature: Delegation of the power to sign messages
-
M. Mombo, K. Usuda and E. Okamoto, Proxy signature: delegation of the power to sign messages, IEICE Transactions on FundamentaL, vol.E79-A, no.9, pp. 1338-1353, 1996.
-
(1996)
IEICE Transactions on FundamentaL
, vol.E79-A
, Issue.9
, pp. 1338-1353
-
-
Mombo, M.1
Usuda, K.2
Okamoto, E.3
-
4
-
-
0018545449
-
How to share a secret
-
A. Shamir, How to share a secret, Communications of the ACM, vol.22, no.ll, pp.612-613, 1979.
-
(1979)
Communications of the ACM
, vol.22
, Issue.LL
, pp. 612-613
-
-
Shamir, A.1
-
5
-
-
84876222959
-
Distributed provers with applications to undeniable signatures
-
Brighton, England, pp
-
T. P. Pedersen, Distributed provers with applications to undeniable signatures, Proc. of the EURO- CRYPT'91, Brighton, England, pp.221-242, 1991.
-
(1991)
Proc. of the EURO- CRYPT'91
, pp. 221-242
-
-
Pedersen, T.P.1
-
6
-
-
85030460443
-
-
T. P. Pedersen, A threshold cryptosystem without a trusted party, Proc. of the EUROCRYPT'91, Brighton, England, pp.522-526, 1991.
-
T. P. Pedersen, A threshold cryptosystem without a trusted party, Proc. of the EUROCRYPT'91, Brighton, England, pp.522-526, 1991.
-
-
-
-
7
-
-
0000064722
-
Threshold proxy signature schemes
-
California, USA, pp
-
K. Zhang, Threshold proxy signature schemes, Proc. of the Information Security Workshop, California, USA, pp.282-290, 1997.
-
(1997)
Proc. of the Information Security Workshop
, pp. 282-290
-
-
Zhang, K.1
-
8
-
-
0010567510
-
Proxy signature, revisited
-
Beijing, China, pp
-
S. Kim, S. Part and D. Won, Proxy signature, revisited, Proc. of the International Conference on Information and Communication Security, Beijing, China, pp.223-232, 1997.
-
(1997)
Proc. of the International Conference on Information and Communication Security
, pp. 223-232
-
-
Kim, S.1
Part, S.2
Won, D.3
-
9
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
R. L. Rivest, A. Shamir and L. M. Adleman, A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, vol.21, no.2, pp.120-126, 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.M.3
-
10
-
-
0032670844
-
An efficient nonrepudiable threshold proxy signature scheme with known signers
-
H. M. Sun, An efficient nonrepudiable threshold proxy signature scheme with known signers, Computer Communications, vol.22, no.8, pp.717-722, 1999.
-
(1999)
Computer Communications
, vol.22
, Issue.8
, pp. 717-722
-
-
Sun, H.M.1
-
11
-
-
0033354258
-
Threshold proxy signatures
-
H. M. Sun, Threshold proxy signatures, IEE Proceedings of Computers and Digital Techniques, vol.146, no.5, pp.259-263, 1999.
-
(1999)
IEE Proceedings of Computers and Digital Techniques
, vol.146
, Issue.5
, pp. 259-263
-
-
Sun, H.M.1
-
12
-
-
0141518230
-
A secure nonrepudiable threshold proxy signature scheme with known signers
-
M. S. Hwang, I. C. Lin and J. L. Lu, A secure nonrepudiable threshold proxy signature scheme with known signers, Informatica, vol.11, no.2, pp.1-8, 2000.
-
(2000)
Informatica
, vol.11
, Issue.2
, pp. 1-8
-
-
Hwang, M.S.1
Lin, I.C.2
Lu, J.L.3
-
13
-
-
0035451175
-
New nonrepudiable threshold proxy signature scheme with known signers
-
C. L. Hsu, T. S. Wu and T. C. Wu, New nonrepudiable threshold proxy signature scheme with known signers, The Journal of Systems and Software, vol.58, no.5, pp.119-124, 2001.
-
(2001)
The Journal of Systems and Software
, vol.58
, Issue.5
, pp. 119-124
-
-
Hsu, C.L.1
Wu, T.S.2
Wu, T.C.3
-
14
-
-
35048825374
-
Security analysis of some proxy signatures
-
Mongolia, China, pp
-
G. Wang, F. Bao, J. Zhou and R. H. Deng, Security analysis of some proxy signatures, Proc. of the International Conference on Information Security and Cryptology, Mongolia, China, pp.305-319, 2004.
-
(2004)
Proc. of the International Conference on Information Security and Cryptology
, pp. 305-319
-
-
Wang, G.1
Bao, F.2
Zhou, J.3
Deng, R.H.4
-
15
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
T. ElGamal, A public key cryptosystem and a signature scheme based on discrete logarithms, IEEE Transactions on Information Theory, vol.31, no.4, pp.469-472, 1985.
-
(1985)
IEEE Transactions on Information Theory
, vol.31
, Issue.4
, pp. 469-472
-
-
ElGamal, T.1
-
16
-
-
12344258539
-
Efficient signature generation by smart cards
-
C. Schnorr, Efficient signature generation by smart cards, Cryptology, vol.4, no.3, pp.161-174, 1991.
-
(1991)
Cryptology
, vol.4
, Issue.3
, pp. 161-174
-
-
Schnorr, C.1
-
17
-
-
56649114655
-
An RSA-based (í, n) threshold proxy signature scheme with free-will identities
-
Y. F. Chang and C. C. Chang, An RSA-based (í, n) threshold proxy signature scheme with free-will identities, International Journal of Information and Computer Security, vol.l, no.1/2, pp.201-209, 2007
-
(2007)
International Journal of Information and Computer Security
, vol.50
, Issue.1-2
, pp. 201-209
-
-
Chang, Y.F.1
Chang, C.C.2
-
18
-
-
0242582261
-
An efficient and practical (t, n) threshold proxy signature scheme with known signers
-
H. F. Huang and C. C. Chang, An efficient and practical (t, n) threshold proxy signature scheme with known signers, Fundamenta Informaticae, vol.56, no.3, pp.243-253, 2003.
-
(2003)
Fundamenta Informaticae
, vol.56
, Issue.3
, pp. 243-253
-
-
Huang, H.F.1
Chang, C.C.2
-
19
-
-
21644442588
-
Efficient one-time proxy signatures
-
M. Mehta and L. Ham, Efficient one-time proxy signatures, IEE Proceedings of Communications, vol.152, no.2, pp.129-133, 2005.
-
(2005)
IEE Proceedings of Communications
, vol.152
, Issue.2
, pp. 129-133
-
-
Mehta, M.1
Ham, L.2
-
20
-
-
84958744427
-
1-out-of-n signatures from variety of keys
-
Queenstown, New Zealand
-
M. Abe, M. Ohkubo and K. Suzuki, 1-out-of-n signatures from variety of keys, Proc. of the ASI- ACRYPT 2002, Queenstown, New Zealand, vol.2501, pp.415-432, 2002.
-
(2002)
Proc. of the ASI- ACRYPT 2002
, vol.2501
, pp. 415-432
-
-
Abe, M.1
Ohkubo, M.2
Suzuki, K.3
-
21
-
-
1442308475
-
Efficient threshold signer-ambiguous signatures from variety of keys
-
M. Abe, M. Ohkubo and K. Suzuki, Efficient threshold signer-ambiguous signatures from variety of keys, IEICE Transactions on FundamentaL of Electronics, Communications and Computer Sciences, vol.E87-A, no.2, pp.471-479, 2004.
-
(2004)
IEICE Transactions on FundamentaL of Electronics, Communications and Computer Sciences
, vol.E87-A
, Issue.2
, pp. 471-479
-
-
Abe, M.1
Ohkubo, M.2
Suzuki, K.3
-
22
-
-
48249121784
-
Collision detection and estimation of its spot for a flexible beam using ratio of mode functions
-
Y. Sawada and T. Sako, Collision detection and estimation of its spot for a flexible beam using ratio of mode functions, International Journal of Innovative Computing, Information and Control, vol.2, no.5, pp.1027-1038, 2005.
-
(2005)
International Journal of Innovative Computing, Information and Control
, vol.2
, Issue.5
, pp. 1027-1038
-
-
Sawada, Y.1
Sako, T.2
-
23
-
-
48249149342
-
Security analysis of session initiation protocol
-
Z. Zhang, B. Fang, M. Hu and H. Zhang, Security analysis of session initiation protocol, International Journal of Innovative Computing, Information and Control, vol.3, no.3, pp.457-469, 2007.
-
(2007)
International Journal of Innovative Computing, Information and Control
, vol.3
, Issue.3
, pp. 457-469
-
-
Zhang, Z.1
Fang, B.2
Hu, M.3
Zhang, H.4
-
24
-
-
48249127045
-
-
L. Mi and F. Takeda, Analysis on the Robustness of the pressure-based individual identification system based on neural networks, International Journal of Innovative Computing, Information and Control, 3, no.l, pp.97-110, 2007.
-
L. Mi and F. Takeda, Analysis on the Robustness of the pressure-based individual identification system based on neural networks, International Journal of Innovative Computing, Information and Control, vol.3, no.l, pp.97-110, 2007.
-
-
-
|