共 8 条
[1]
Tan Z., Liu Z., Tang C., Digital Proxy Blind Signature Schemes Based on DLP and ECDLP, 21, pp. 212-217, (2002)
[2]
Lu E.J.-L., Hwang M.-S., Huang C.-J., A new proxy signature scheme with revocation, Applied Mathematics and Computation, 161, 3, pp. 799-806, (2005)
[3]
Wang X.-M., Zhang Z., Fu F.-W., A secure threshold proxy signature scheme, Journal of Electronics and Information Technology, 28, 7, pp. 1308-1311, (2006)
[4]
Abe M., Okamoto T., Provably secure partially blind signatures, Advances in Cryptology: Crypto' 2000, pp. 271-286, (2000)
[5]
Mambo M., Usuda K., Okamoto E., Proxy signatures: Delegation of the power to sign messages, IEICE Trans. Fundamentals, E79-A, 9, pp. 1338-1354, (1996)
[6]
Mambo M., Usuda K., Okamoto E., Proxy signatures for delegating signing operation, Proc. 3rd ACM Conference on Computer and Communications Security, pp. 48-57, (1996)
[7]
Wang S.H., Wang G.L., Bao F., Et al., Cryptanalysis of a proxy-protected proxy signature scheme based on elliptic curve cryptosystem, Vehicular Technology Conference, pp. 3240-3243, (2004)
[8]
Li J.-G., Cao Z.-F., Li J.-Z., Et al., Present situation and progress of proxy signature, Journal of China Institute of Communications, 24, 10, pp. 114-124, (2003)