[1]
|
Zoe L. Jiang, S. M. Yiu, L. C. K. Hui, Y. Dong, and S. H. Y. Wong, “Chained threshold proxy signature without and with Supervision,” In 2008 International Conference on Computer Science and Software Engineering (CSSE’08), HongKong, China, pp. 837?840, December 2008.
|
[2]
|
S. Kim, S. Park, and D. Won, “Proxy signatures, revis-ited,” In 1st International Conference on Information and Communications Security (ICICS’97), LNCS 1334, Bei-jing, China, pp. 223?232, 1997.
|
[3]
|
M. Mambo, K. Usuda, and E. Okamoto, “Proxy signa-tures for delegating signing operations,” In 3rd ACM Conference on Computer and Communication Security, New Delhi, India, pp. 48?57, 1996.
|
[4]
|
T. El Gamal, “A public key cryptosystem and a signature scheme based on discrete logarithms,” In IEEE Transac-tions on Information Theory, Vol. 31, No. 4, pp. 469?472, 1985.
|
[5]
|
T. Okamoto, “Provably secure and practical identi?cation schemes and corresponding signature schemes,” In Ad-vances in Cryptology (Crypto’92), LNCS 740, pp. 31?53, 1992.
|
[6]
|
A. Fiat and A. Shamir, “How to prove yourself: Practical solutions to identi?cation and signature problems,” In Advances in Cryptology-Eurocrypt 1986 (EuroCrypt’86), LNCS 263, pp. 186?194, 1987.
|
[7]
|
B. C. Neuman, “Proxy-based authorization and account-ing for distributed systems,” In Proceedings of 13th In-ternational Conference on Distributed Computing Sys-tems, Pittsburgh, USA, pp. 283?291, May 1993.
|
[8]
|
M. Cerecedo, T. Matsumoto, and H. Imal, “Ef?cient and secure multiparty generation of digital signatures based on discrete logarithms,” In IEICE Transactions on Fun-damentals of Electronics, Communications & Computer Science, Vol. E76-A, No. 4, pp. 532?545, 1993.
|
[9]
|
R. W. C. Lui, L. C. K. Hui, and S. M. Yiu, “Delegation with supervision,” In Information Sciences, Vol. 177, No. 19, pp. 4014?4030, 2007.
|
[10]
|
A. Boldyreva, A. Palacio, and B. Warinschi, “Secure proxy signature schemes for delegation of signing rights,” http://eprint.iacr.org/2003/096.
|
[11]
|
A. Herzberg, S. Jarecki, H. Krawczyk, and M. Yung. “Proactive secret sharing or: How to cope with perpetual leakage,” In Advances in Cryptology (Crypto’95), LNCS 963, Vol. 963, pp. 339?352, 1995.
|
[12]
|
C. P. Schnorr, “Ef?cient signature generation by smart-cards,” In Journal of Cryptology, Vol. 4, No. 3, pp. 161? 174, 1991.
|