1 |
L. Yi, G. Bai and G. Xiao, 'Proxy multi-signature scheme : A new type of proxy signature scheme,' Electronics Letters, Vol.36, No.6, 2000
DOI
ScienceOn
|
2 |
T. ElGamal, 'A public key cryptosystem and signature scheme based on discrete logarithms,' IEEE Tran. Information Theory, Vol.31, No.4, 1985
DOI
|
3 |
D. Chaum and H. van Antwerpen, 'Undeniable signatures,' Advances in Cryptology-CRYPTO '89 Proceedings, Springer -Verlag, 1990
|
4 |
K. Shum and Victor K. Wei, 'A strong proxy signatures scheme with proxy signer privacy protection,' Proceedings of the Eleventh IEEE International Workshops on Enabling Technologies : Infrastructure for Collaborative Enterprises, 2002
DOI
|
5 |
M. Mambo, K. Usuda and E. Okamoto, 'Proxy signatures tor delegating signing operation,' Proc. Third ACM Conf. on Computer and Communications Security, 1996
DOI
|
6 |
M. Mambo, K. Usuda, and E. Okamoto, 'Proxy signatures : Delegation of the power to sign message,' IEICE Trans. Fundamentals, Vol.E79-A, No.9, 1996
|
7 |
B. Lee, H. Kim, K. Kim, 'Strong Proxy Signature and its Applications,' Proc. of SCIS, 2001
|
8 |
C. Gamage, J. Leiwo and Y. Zheng, 'An efficient scheme for secure message transmission using proxy-signcryp-tion,' Technical Report 98-01, Peninsula School of Computing & Information Technology, Monash universirt, July, 1998
|
9 |
H. M. Sun, 'On proxy(multi) signature schemes,' Proceedings of the 2000 ICS : Workshop on Cryptology and Information Security, 2000
|
10 |
HB. Lee and K. Kim. 'Self-Certificate : PKI using Self-Certified Key,' Proc. of Conference on Information Security and Crtptology, 2000
|
11 |
S. J. Kim. S. J. Park and D. H. Won, 'Nominative signatures,' Proc. ICEIC'95, 1995
|
12 |
V. Varadharajan, P. Allen and S. Black, 'An analysis of the proxy problem in distributed systems,' Proc. 1991 IEEE Computer Society Symposium on Research in Security and Privacy, 1991
DOI
|
13 |
K. Zhang, 'Threshold proxy signature schemes,' 1997 Information Security Workshop, 1997
|
14 |
Byungcheon LEE, Kwangjo Kim, 'Strong Proxy Signatures,' IEICE Trans. Fundamentals, No.1, 1999
|
15 |
A. Shamir, 'Identity-based cryptosystems and signature schemes,' Advances in Cryptology-Crypto 84, 1984
|
16 |
M. Hwang, I. Lin and E. J. Lu, 'A secure nonrepudiable threshold proxy signature scheme with known signers,' International Journal of Informatica, 2000
|
17 |
M.Abe, T. Okamoto, 'Provably secure partially blind signatures,' In Advances in Cyyptologt Crypto, 2000
|
18 |
H. Petersen and P. Horster, 'Self-certified keys Concepts and Applications,' In Proc. Communications and Multimedia Security '97, 1997
|
19 |
M. Bellare and S. Miner, 'A forward-Secure digital signature scheme,' Crypto '99, 1999
|
20 |
B. Lee, H. Kim and K. kim, 'Secure mobile agent using strong non-designated proxy signature,' Proc. of ACISP 2001, LNCS 2119, Springer-Verlag, 2001
|
21 |
D. Chaum, 'Blind signatures for untraceable payments,' Advances in Cryptology : Crypto '82, Prenum Publishing Corporation, 1982
|
22 |
P. Horster, M. Michels, H. Petersen, 'Hidden signature schemes based on the discrete logarithm problem and related concepts,' Proc. of Communications and Multimedia Security '95, Chapman & Hall, 1995
|