共 11 条
- [1] Modified Maurer-Yacobi’’s scheme and its applications. Lim C H,Lee P J. Proceedings of the Australasian Conference on Information Security and Privacy . 1992
- [2] Limited verifier signature from bilinear pairings. Chen X,Zhang F,Kim K. Proceedings of the International Conference on Applied Cryptography and Network Security . 2004
- [3] A directed thresholdsignature scheme. Sunder L,Manoj K. http://arxiv.org/ftp/cs/papers/0411/0411005.pdf . 2004
- [4] A directed signature scheme and its applications. Lal S,Kumar M. http://arxiv.org/ftp/cs/papers/0409/0409036.pdf . 2004
- [5] New (t,n) threshold directed signature scheme with provable security. Lu R,Lin X,Cao Z,et al. Journal of Information Science . 2008
- [6] A secure identity-based multi-proxy signature scheme. Cao F,,Cao Z. Computers & Electrical Engineering . 2009
- [7] Security analysis of some proxy signatures. Wang Gui-lin,Bao Feng,Zhou Jian-yin,et al. Proceedings of the International Conference on Information and Communications Security . 2003
- [8] A directed signature scheme based on RSA assumption. Lu R,Cao Z. International Journal of Network Security . 2006
- [9] ID-based directed threshold multisignature scheme from bilinear pairings. Reddy P V,Rao B U,Gowri T. International Journal on Computer Science and Engineering . 2009
- [10] A directed signature scheme and its application to group key initial distribution. Wei Q,He J,Shao H. Proceedings of the International Conference on Interaction Sciences: Information Technology,Culture and Human . 2009