BLAZE M, BLEUMER G, and STRAUSS M. Divertible protocols and atomic proxy cryptography[C]. Proceedings of EUROCRYPT98, Helsinki, Finland, 1998: 127-144. doi: 10.1.1.81.8246.
|
HAO S G, ZHANG L, and MUHAMMAD G. A union authentication protocol of cross-domain based on bilinear pairing[J]. Journal of Software, 2013, 8(5): 1094-1100. doi: 10.4304/jsw.8.5.1094-1100.
|
NGUYEN T C, SHEN W, LUO Z, et al. Novel Data Integrity Verification Schemes in Cloud Storage[M]. Switzerland: Springer International Publishing, 2015: 115-125. doi: 10.1007/BFb0054122.
|
孙奕, 陈性元, 杜学绘, 等. 一种用于流交换的代理重签名方案[J]. 软件学报, 2015, 26(1): 129-144. doi: 10.13328/j.cnki. jos.004553.
|
SUN Yi, CHEN X Y, DU X H, et al. Proxy re-signature scheme for stream exchange[J]. Journal of Software, 2015, 26(1): 129-144. doi: 10.13328/j.cnki.jos.004553.
|
ATENIESE G and HOHENBERGER S. Proxy re-signatures: new definitions, algorithms, and applications[C]. Proceedings of the 12th ACM CCS, Alexandria, USA, 2005: 310-319. doi: 10.1145/1102120.1102161.
|
SHAO J, CAO Z, WANG L, et al. Proxy re-signature schemes without random oracles[C]. Proceedings of INDO-CRYPT 2007, Chennai, India, 2007: 197-209. doi: 10.1007/ 978-3-540-77026-8_15.
|
WATERS B. Efficient identity-based encryption without random oracles[C]. Proceedings of EuroCrypt 2005, Aarhus, 2005: 114-127. doi: 10.1007/11426639_7.
|
KiIATE K, IKKWON Y, and SECOGAN L. Remark on shao et als bidirectional proxy re-signature scheme in indocrypt07[J]. International Journal of Network Security, 2009, 8(3): 308-311. doi: 10.4304/jcp.7.7.1796-1800.
|
LIBERT B and VERGNAUD D. Multi-use unidirectional proxy re-signatures[C]. Proceedings of the 15th ACM Conference on Computer and Communications Security, Alexandria, USA, 2008: 511-520. doi: 10.1145/1455770. 1455835.
|
WANG W P. An identity-based blind proxy re-signature scheme[J]. Computer Applications and Software, 2012, 29(10): 308-313. doi: 10.3969/j.issn.1000.
|
YANG X, LI C, LI Y, et al. Divisible on-line/off-line proxy re-signature[J]. Applied Mathematics Information Sciences, 2015, 9(2): 759-767. doi: 10.1007/978-3-642-00862-7_10.
|
YANG X, WANG C, ZHANG L, et al. On-line/off-line threshold proxy re-signatures[J]. Chinese Journal of Electronics, 2014, 23(2): 248-253. doi: 10.4156/jcit.vol7. issue23.7.
|
TIAN M M. Identity-based proxy re-signatures from lattices [J]. Information Processing Letters, 2015, 115(4): 462-467. doi: 10.1016/j.ipl.2014.12.002.
|
江明明, 胡予濮, 王保仓, 等. 格上基于身份的单向代理重签名[J]. 电子与信息学报, 2014, 36(3): 645-649. doi: 10.3724/ SP.J.1146.2013. 00818.
|
JIANG M M, HU Y P, WANG B C, et al. Identity-based unidirectional proxy re-signature over lattice[J]. Journal of Electronics Information Technology, 2014, 36(3): 645-649. doi: 10.3724/SP.J.1146.2013. 00818.
|
龙昭华, 龚俊, 王波, 等. 无线传感器网络中分簇安全路由协议保密通信方法的能效研究[J]. 电子与信息学报, 2015, 37(8): 2000-2006. doi: 10.11999/JEIT141284.
|
LONG Z H, GONG J, WANG B, et al. Energy efficiency study of secret communication method on clustering[J]. Journal of Electronics Information Technology, 2015, 37(8): 2000-2006. doi: 10.11999/JEIT141284.
|
WANG Z and W. Server-aided verification proxy re-signature[C]. Proceedings of Trust, Security and Privacy in Computing and Communications, Melbourne, Australia, 2013: 1704-1707. doi: 10.1109/TrustCom.2013.211.
|
CANETTI R, GOLDREICH O, and HALEVI S. The random oracle methodology, revisited[J]. Journal of the ACM, 2004, 51(4): 557-594. doi: 10.1145/1008731.1008734.
|
WU W, MU Y, SUSILO W, et al. Server-aided verification signatures: definitions and new constructions[C]. Proceedings of Provable Security, Shanghai, China, 2008: 141-155. doi: 10.1007/978-3-540-88733-1_10.
|
WANG Zh W, WANG L Ch , YANG Y X, et al. Comment on Wu et al.s server-aided verification signature schemes[J]. International Journal of Network Security, 2010, 10(2): 158-160. doi: 10.1.1.592.231.
|