共 9 条
[1]
A public-key cryptosystem and signature schemebased on discrete logarithms. ELGamal T. IEEE Transactions on Information Theory . 1985
[2]
Proxy signatures for delega-ting signing operation. Mambo M,Usuda K,Okamoto E. Proceeding 3rd ACM Conference onComputer and Communications Security . 1996
[3]
Proxy signature:Delegationof the power to sign messages. Mambo M,,Usuda K,Okamoto E. IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences . 1996
[4]
Blind signature systems. Cham D. Proceedings ofCrypto‘83 . 1998
[5]
A privacy-protec-ting proxy signature scheme and its application. Dai Jia-Zhu,Yang Xiao-Hu,Dong Jin-Xiang. . 2004
[6]
Threshold proxy signature schemes. Zhang K. Infor-mation Security Workshop . 1997
[7]
A proxy signa-ture scheme with proxy signer‘s privacy anonymity. Fu Xiao-tong,,Kou Wei-dong,Xiao Guo-zhen. Procee-dings of the IEEE international on E-Commerce Technology forDynamic E-Business . 2004
[8]
Strong proxy signature and its applica-tions. Lee B,,Kim H,Kim K. Proc of SCIS . 2001
[9]
A strong proxy signature scheme with proxysigner privacy protection. Shum K,Wei V K. Proceedingsof the Eleventh IEEE International Workshop on Enabling Tech-nologies:Infrastructure for Collaborative Enterprises . 2002

