[1] Mambo M, Usuda K, Okamoto E. Proxy signature: delegation of the power to sign messages[J]. IEICE Trans Fundamentals, 1996, E79-A (9): 1338-1353.
[2] Mambo M, Usuda K, Okamoto E. Proxy signatures for delegating signing operation // Proc 3rd ACM Conference on Computer and Communications Security. New York: ACM Press, 1996: 48-57.
[3] Kim S, Park S, Won D. Proxy signature, revisited// International Conference on Information and Communication Security. : Springer-Verlag, 1997: 223-232.
[4] Lee B, Kim H, Kim K. Strong proxy signature and its application // Proc of ACISP 2001. Japan:, 2001: 603-608.
[5] Lee B, Kim H, Kim K. Secure mobile agent using strong non-designated proxy signature // Proc of ACISP 2001. London: Springer-Verlag, 2001: 474-486.
[6] 丘慧敏, 杨义先, 胡正名, 等.一种基于ElGamal数字签名的双向用户鉴别方案[J]. 北京邮电大学学报, 2005, 28(3): 100-103. Qiu Huimin, Yang Yixian, Hu Zhengming, et al. A two-way user authentication scheme based on ElGamal digital signature[J]. Journal of Beijing University of Posts and Telecommunications, 2005, 28(3): 100-103.
[7] Kim H, Baek J, Lee B, et al. Computing with secrets for mobile agent using one-time proxy signature // ACISP 2001. Japan:, 2001: 845-850.
[8] Tzeng S F, Hwang M S, Yang C Y. An improvement of nonrepudiable threshold proxy signature scheme with known signers[J]. Computer Security, 2004(23): 174-178.
[9] Petersen H, Horster P. Self-certified keys-concepts and applications // Proc of 3rd Conference on Communications and Multimedia Security. : Chapman & Hall, 1997: 102-116.
[10] 谷利泽, 李忠献, 杨义先. 不需要可信任方的匿名代理签名方案[J]. 北京邮电大学学报, 2005, 28(1): 48-51. Gu Lize, Li Zhongxian, Yang Yixian. A anonymous proxy signature scheme without a trusted party[J]. Journal of Beijing University of Posts and Telecommunications, 2005, 28(1): 48-51.
[11] Shum K, Wei V K. A strong proxy signature with proxy signer privacy protection //Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises. Pittsburgh: , 2002: 55-57.
[12] Zhang K. Threshold proxy signature schemes // Information Security Workshop. Japan:, 1997: 191-197.
[13] Sun Hungmin, Lee N Y, Hwang T. Threshold proxy signatures [J]. IEEE Proceedings Computers & Digital Techniques, 1999, 146(5): 259-263.
[14] Sun Hungmin. An efficient nonrepudiable threshold proxy signature scheme with known signers[J]. Computer Communications, 1999, 22(8): 717-722.
[15] Hsu C L, Wu T S, Wu T C. New nonrepudiable threshold proxy signature scheme with known signers[J]. The Journal of System and Software, 2001, 58(2): 119-124.
[16] Hwang S J, Shi C H. A simple multi-proxy signature scheme // Proceedings of the Tenth National Conference on Information Security. Taiwan:, 2000: 134-138.
[17] Hwang S J, Chen Chiuchin. A new proxy multi-signature scheme // International Workshop on Cryptology and Network Security. Taiwan: , 2001: 26-28.
[18] Yi Lijiang, Bai Guoqiang, Xiao Guozhen. Proxy multi-signature: a new type of proxy signature schemes[J]. Acta Electronica Sinica, 2001, 29(4): 569-570. |