共 19 条
[1]
Blaze M., Bleumer G., Strauss M., Divertible protocols and atomic proxy cryptography, Proceedings of EUROCRYPT, LNCS 1403, pp. 127-144, (1998)
[2]
Zhang J., Cui Y., Min X., Zou J., An Efficient and Provably Secure Proxy Signature Scheme, JCIT, 6, 7, pp. 294-302, (2011)
[3]
Luo W., Li C., Bai G., Chen L., A Certificateless Sequential Multi-Signature Scheme without Pairings, IJACT, 4, 9, pp. 193-199, (2012)
[4]
Ateniese G., Hohenberger S., Proxy re-signatures: New definitions, algorithms and applications, Proceedings of ACM Conference On Computer and Communications Security, pp. 310-319, (2005)
[5]
Shao J., Cao Z., Wang L., Liang X., Proxy re-signature schemes without random oracles, Proceedings of INDO-CRYPT 2007, LNCS 4859, pp. 260-276, (2008)
[6]
Chow S.S.M., Phan R.C.-W., Proxy re-signatures in the standard model, Proceedings of 11th International Conference On Information Security, pp. 260-276, (2008)
[7]
Libert B., Vergnaud D., Multi-use unidirectional proxy re-signatures, Proceedings of the 15th ACM Conference On CCS, pp. 511-520, (2008)
[8]
Shao J., Wei G., Ling Y., Xie M., Unidirectional identity-based proxy re-signature, Proceedings of 2011 IEEE ICC, pp. 1-5, (2011)
[9]
Shao J., Feng M., Zhu B., Cao Z., Liu P., The security model of unidirectional proxy re-signature with private re-signature key, Information Systems Security, LNCS, 4859, pp. 216-232, (2010)
[10]
Deng Y., Ge S., Proxy re-signature scheme based on quadratic residues, Journal of Networks, 6, 10, pp. 1459-1465, (2011)