References
- ANSI X9.62-1999, The elliptic curve digital signature algorithm (ECDSA), Technical report, American Bankers Association, 1999.
- W. Die and M. E. Hellman, New directions in cryptography, IEEE Trans. Inform. Theory IT-22 (1976), 644-654. https://doi.org/10.1109/TIT.1976.1055638
- T. ElGamal, A public key cryptosystem and a signature scheme based on discrete logarithms, IEEE Trans. Inform. Theory IT-31 (1985), 469-472. https://doi.org/10.1109/TIT.1985.1057074
- M. Girault, Self-certied public keys, Advances in Cryptology Eurocrypt' 91, 491-497, Berlin: Springe-Verlag, 1991.
- C. L. Hsu and T. S. Wu, Ecient proxy signature schemes using self-certied public keys, Appl. Math. Comput. 152 (2004), no. 3, 807-820. https://doi.org/10.1016/S0096-3003(03)00596-4
- N. Koblitz, Elliptic curve cryptosystems, Math. Comp. 48 (1987), no. 177, 203-209. https://doi.org/10.1090/S0025-5718-1987-0866109-5
- J. G. Li, Y. C. Zhang, and Y. L. Zhu, A new proxy signature scheme with message recovery using self-certified public key, Wuhan Univ. J. Nat. Sci. 10 (2005), no. 1, 219-222. https://doi.org/10.1007/BF02828654
- R. Lu and Z. Cao, Designated verier proxy signature scheme with message recovery, Appl. Math. Comput. 169 (2005), no. 2, 1237-1246. https://doi.org/10.1016/j.amc.2004.10.070
- M. Mambo, K. Usuda, and E. Okamoto, Proxy signatures: delegation of the power to sign messages, IEICE Trans. Fundam. E79-A (1996), no. 9, 1338-1354.
- V. S. Miller, Use of elliptic curves in cryptography, Advances in cryptologyCRYPTO '85 (Santa Barbara, Calif., 1985), 417-426, Lecture Notes in Comput. Sci., 218, Springer, Berlin, 1986.
- National Institute of Standards and Technology, A proposed federal information pro- cessing standard for digital signature standard (DSS), Federal Register 56 (1991), no. 169, 42980-42982.
- K. Nyberg and A. R. Rueppel, Message recovery for signature schemes based on the discrete logarithm problem, Advances in cryptologyEUROCRYPT '94 (Perugia), 182-193, Lecture Notes in Comput. Sci., 950, Springer, Berlin, 1995.
- S. Padhye and N. Tiwari, ECDLP-based certicateless proxy signature scheme with message recovery, Trans. Emerging Tel. Tech. 26 (2015), 346-354. https://doi.org/10.1002/ett.2608
- R. Rajaram Ramasamy and M. Amutha Prabakar, Digital signature scheme with mes- sage recovery using knapsack-based ECC, Int. J. Network Security 12 (2011), no. 1, 7-12.
- R. L. Rivest, A. Shamir, and L. M. Adleman, A method for obtaining digital signatures and public key cryptosystems, Comm. ACM 21 (1978), no. 2, 120-126. https://doi.org/10.1145/359340.359342
- C. P. Schnorr, Ecient signature generation by smart cards, J. Cryptol. 3 (1991), no. 3, 161-174.
- A. Shamir, Identity-based cryptosystems and signature schemes, Advances in cryptology (Santa Barbara, Calif., 1984), 47-53, Lecture Notes in Comput. Sci., 196, Springer, Berlin, 1985.
- Z. Shao, Improvement of ecient proxy signature schemes using self-certified public keys, Appl. Math. Comput. 168 (2005), no. 1, 222-234. https://doi.org/10.1016/j.amc.2004.08.029
- H. Singh and G. K. Verma, ID-based proxy signature scheme with message recovery, J. Sys. Software 85 (2012), 209-214. https://doi.org/10.1016/j.jss.2011.08.018
- M. Tian, L. Huang, and W. Yang, Cryptanalysis of an ID-based proxy signature scheme with message recovery, Appl. Math. Inf. Sci. 6 (2012), no. 3, 419-422.
- T. S. Wu, C. L. Hsu, and H. Y. Lin, Self-certied multi-proxy signature schemes with message recovery, J. Zhejiang Univ. Sci. A 10 (2009), no. 2, 290-300. https://doi.org/10.1631/jzus.A0820202
- Q. Xie, Provably secure self-certied multi-proxy signature with message recovery, J. Networks 7 (2012), no. 10, 1616-1623.