1 |
Dan Boneh, Craig Gentry, Ben Lynn, and Hovav Shacham, Aggregate and Verifiably Encrypted Signatures from Bilinear Maps, EUROCRYPT 2003, International Conference on the Theory and Applications of Cryptographic Techniques, Warsaw, Poland, May 4-8, 2003, Proceedings, volume 2656 of Lecture Notes in Computer Science, pages 416-432. Springer
|
2 |
Sherman S.M. Chow, Richard W.C. Lui, Lucas C.K. Hui, and S.M. Yiu, Identity Based Delegation Network, Mycrypt 2005, LNCS 3715, pp.99-115, 2005
|
3 |
Min-Shiang Hwang, Eric Jui-Lin Lu, and Iuon-Chang Lin, A Practical (t,n)-Threshold Proxy Signature Scheme Based on the RSA Cryptosystem, IEEE Transactions on Knowledge and Data Engineering, VOL.15, NO.6, November/December 2003
|
4 |
M. Mambo, K. Usuda, and E. Okamoto, Proxy Signatures for Delegating Signing Operation, Proc. 3rd ACM Conference on Computer and Communications Security, 1996
|
5 |
H.-M.Sun, N.-Y.Lee, and T.Hwang, Threshold proxy signatures, IEE Proc. Computers and Digital Techniques, Vol.146, No.5, September, 1999
|
6 |
Jing Xu, Zhenfeng Zhang, and Dengguo Feng, ID-Based Proxy Signature Using Bilinear Pairings, Cryptology ePrint Archive, Report 2004/206, 2004. Available at http://eprint.iacr.org
|
7 |
Shin-Jia Hwang, and Chiu-Chin Chen, New Multi-Proxy Multi-Signature Schemes, Applied Mathematics and Computation, 147(1):57-67, 2004
DOI
ScienceOn
|
8 |
So-Young Park, and Sang-Ho Lee, Multi-proxy Signatures Based on Diffie-Hellman Problems Allowing Repeated Delegations, HSI 2005, LNCS 3597, pp. 340-344, 2005
|
9 |
Guilin Wang, Feng Bao, Jianying Zhou, and Robert H. Deng, Comments on 'A Practical $(t,n)$ Threshold Proxy Signature Scheme Based on the RSA Cryptosystem', IEEE Transactions on Knowledge and Data Engineering, VOL. 16, NO. 10, OCTOBER 2004
|
10 |
Q. Xue and Z. Cao, Improved of Multi-proxy Signature Scheme, Proceeding of International Symposium on Communications and Information Technologies, pp.450-455, 2004
|
11 |
Tuomas Aura, On the Structure of Delegation Networks, In PCSFW: Proceedings of the Eleventh Computer Security Foundations Workshop. IEEE Computer Society Press, 1998
|
12 |
Wen-Chung Kuo, and Ming-Yang Chen, A Modified (t, n)-Threshold Proxy Signature Scheme Based on the RSA Cryptosystem, Proceedings of the Third International Conference on Information Technology and Applications (ICITA'05), 2005
|
13 |
Xiangxue Li, Kefei Chen, Longjun Zhang, and Shiqun Li, Proxy Structured Multisignature Scheme from Bilinear Pairings, ISPA 2004, LNCS 3358, pp. 705-714, 2004
|
14 |
Lijang Yi, Guoqiaiig Bai, and Guozhen Xiao, Proxy multi-signature scheme: A new type of proxy signature scheme, Electronics Letters, 16th, March 2000, Vol.36, No.6, 2000
|
15 |
Qingshui Xue, and Zhenfu Cao, A Threshold Proxy Signature Scheme Using Self-Certified Public Keys, ISPA 2004, LNCS 3358, pp.715-724, 2004
|