共 19 条
[11]
Guo D., Wei P., Danyu X.Y., A certificateless proxy re-signature scheme, Proceedings of IEEE ICCSIT 2010, pp. 157-161, (2010)
[12]
Hong X., Chen K., Wan Z., Simplified universally composable proxy re-signature, Journal of Software, 21, 8, pp. 2079-2088, (2010)
[13]
Yang P., Cao Z., Dong X., Threshold proxy re-signature, Journal of Systems Science and Complexity, 24, 4, pp. 816-824, (2011)
[14]
Yang X., Wang C., Threshold proxy re-signature schemes in the standard model, Chinese Journal of Electronics, 19, 2 E, pp. 345-350, (2010)
[15]
Shamir A., Tauman Y., Improved on-line/off-line signature schemes, Proceedings of CRYPTO'01, LNCS 2139, pp. 355-367, (2001)
[16]
Krawczyk H., Rabin T., Chameleon hashing and signatures, Annual Network and Distributed System Security Symposium, pp. 143-154, (2000)
[17]
Goldwasser S., Micali S., Ronald L., Rivest A., A digital signature scheme secure against adaptive chosen-message attacks, SIAM Journal On Computing, 17, 2, pp. 281-308, (1998)
[18]
Bresson E., Catalano D., Gennaro R., Improved on-line/off-line threshold signatures, Proceedings of PKC 2007, pp. 217-232, (2007)
[19]
Gao C.-Z., Wei B., Xie D., Chunmingtang, Divisible on-line/off-line signatures, Proceedings of CT-RSA 2009, pp. 562-566, (2009)