共 17 条
[1]
Awasthi A.K., Lal S., Proxy blind signature scheme, Transaction on Cryptology, 2, 1, pp. 5-11, (2005)
[2]
Huang H., Chang C., A novel efficient (t,n) threshold proxy signature scheme, Information Sciences, 176, 10, pp. 1338-1349, (2006)
[3]
Hwang S.J., Shi C.H., A simple multi-proxy signature scheme, Proceedings of the 10th National Conference on Information Security, pp. 134-138, (2000)
[4]
Jiang-Pin N., Zhong J.Z., Forward-secure proxy signature scheme based on bilinear pairings, Computer Engineering, 35, 6, pp. 164-165, (2009)
[5]
Jie Y., Hai-Feng Q., Li Z.-B., Strong forward security proxy signature scheme, Computer Engineering, 34, 17, pp. 162-164, (2008)
[6]
Kim S., Park S., Won D., Proxy signatures, Proceedings of International Conference on Information and Communications Security (ICICS), pp. 223-232, (1997)
[7]
Koblitz N., Elliptic curve cryptosystems, Mathematics of Computation, 48, 177, pp. 203-209, (1987)
[8]
Koblitz N., The state of elliptic curve cryptography, Design, Code Cryptography, 19, pp. 173-193, (1987)
[9]
Lee B., Kim H., Kim K., Strong proxy signature and its applications, Proceedings of SCIS - Symposium on Cryptology and Information Security, 2, 2, pp. 603-608, (2001)
[10]
Lee J., Cheon J., Kim S., An analysis of proxy signatures, Is A Secure Channel Necessary, Cryptology-CTRSA'03, pp. 68-79, (2003)