1 |
M. Mambo, K. Usuda, and E. Okamoto, "Proxy signature: delegation of the power to sign messages," IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol. 79A, no. 9, pp. 1338-1354, 1996.
|
2 |
S. Huang and C. H. Shi, "A simple multi-proxy signature scheme," in Proceedings of the 10th National Conference on Information Security, Hualien, Taiwan, 2000, pp. 134-138.
|
3 |
H. Bao, Z. Cao and S. Wang, "Improvement on Tzeng et al.'s nonrepudiable threshold multi-proxy multisignature scheme with shared verification," Applied Mathematics and Computation, vol. 169, no. 2, pp. 1419- 1430, 2005.
DOI
|
4 |
C. Hsu, T. Wu, and T. Wu, "New nonrepudiable threshold proxy signature scheme with known signers," Journal of Systems and Software, vol. 58, no. 2, pp. 119-124, 2001.
DOI
|
5 |
J. Hu and J. Zhang, "Cryptanalysis and improvement of a threshold proxy signature scheme," Computer Standards and Interfaces, vol. 31, no. 1, pp. 169-173, 2009.
DOI
|
6 |
H. F. Huang and C. C. Chang, "A novel efficient (t,n) threshold proxy signature scheme," Information Sciences, vol. 176, no. 10, pp. 1338-1349, 2006.
DOI
|
7 |
S. Mashhadi, "Analysis of frame attack on Hsu et al.'s non-repudiable threshold multi-proxy multi-signature scheme with shared verification," Scientia Iranica, vol. 19, no. 3, pp. 674-679, 2012.
DOI
|
8 |
S. Mashhadi, "A novel non-repudiable threshold proxy signature scheme with known signers," International Journal of Network Security, vol. 15, no. 4, pp. 231-236, 2013.
|
9 |
S. Mashhadi and M. Abdi, "A Secure non-repudiable general proxy signature," International Journal of Cyber- Security and Digital Forensics, vol. 4, no. 2, pp. 380-389, 2015.
DOI
|
10 |
S. Mashhadi, "A novel secure self proxy signature scheme," International Journal of Network Security, vol. 14, no. 1, pp. 22-26, 2012.
|
11 |
J. Shao, Z. Cao, and R. Lu, "Improvement of Yang et al.'s threshold proxy signature scheme," Journal of Systems and Software, vol. 80, no. 2, pp. 172-177, 2007.
DOI
|
12 |
H. M. Sun, "An efficient nonrepudiable threshold proxy signature scheme with known signers," Computer Communications, vol. 22, no. 8, pp. 717-722, 1999.
DOI
|
13 |
Z. Tan, Z. Liu, and M. Wang, "On the security of some nonrepudiable threshold proxy signature schemes," in Information Security Practice and Experience. Heidelberg: Springer, 2005, pp. 374-385.
|
14 |
C. Y. Yang, S. F. Tzeng, and M. S. Hwang, "On the efficiency of nonrepudiable threshold proxy signature scheme with known signers," Journal of Systems and Software, vol. 73, no. 3, pp. 507-514, 2004.
DOI
|
15 |
K. Zhang, "Threshold proxy signature schemes," in Information Security. Heidelberg: Springer, 1997, pp. 191- 197.
|