Secure threshold proxy signature scheme

被引:0
|
作者
Department of Computer Science, Jinan University, Guangzhou 510632, China [1 ]
不详 [2 ]
机构
来源
Dianzi Yu Xinxi Xuebao | 2006年 / 7卷 / 1308-1311期
关键词
Cryptography;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [1] A SECURE THRESHOLD PROXY SIGNATURE SCHEME
    Xu, Feng
    Zhou, Wenhuan
    Liu, Xuan
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2012, 18 (06): : 617 - 625
  • [2] A secure threshold Paillier proxy signature scheme
    Ting, Pei-yih
    Huang, Xiao-wei
    Wu, Jun-hui
    Hseu, Chia-huei
    JOURNAL OF ZHEJIANG UNIVERSITY-SCIENCE C-COMPUTERS & ELECTRONICS, 2010, 11 (03): : 206 - 213
  • [3] A secure threshold Paillier proxy signature scheme
    Pei-yih TING
    Chia-huei HSEU
    Frontiers of Information Technology & Electronic Engineering, 2010, (03) : 206 - 213
  • [4] Secure Undeniable Threshold Proxy Signature Scheme
    Aboud, Sattar J.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2014, 5 (01) : 63 - 68
  • [5] A secure threshold Paillier proxy signature scheme
    Pei-yih Ting
    Xiao-wei Huang
    Jun-hui Wu
    Chia-huei Hseu
    Journal of Zhejiang University SCIENCE C, 2010, 11 : 206 - 213
  • [6] A NEW FORWARD-SECURE THRESHOLD PROXY RE-SIGNATURE SCHEME
    Yang, Xiaodong
    Wang, Caifen
    Zhang, Yulei
    Wei, Weiyi
    2009 IEEE INTERNATIONAL CONFERENCE ON NETWORK INFRASTRUCTURE AND DIGITAL CONTENT, PROCEEDINGS, 2009, : 566 - 569
  • [7] Improvement of a threshold proxy signature scheme
    Li, Ji-Guo
    Cao, Zhen-Fu
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2002, 39 (11):
  • [8] Improvement of threshold proxy signature scheme
    Hsu, CL
    Wu, TS
    Wu, TC
    APPLIED MATHEMATICS AND COMPUTATION, 2003, 136 (2-3) : 315 - 321
  • [9] Improvement of threshold proxy signature scheme
    Shao, ZH
    COMPUTER STANDARDS & INTERFACES, 2004, 27 (01) : 53 - 59
  • [10] Undeniable Threshold Proxy Signature Scheme
    Aboud, Sattar J.
    Yousef, Sufian
    Cole, Mike
    2013 5TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (CSIT), 2013, : 150 - 153