Mambo M, Usuda K, and Okmoto E. Proxy signatures:Delegation of the power to sign messages [J]. IEICE Trans. onFundamentals of Electronic Communications and ComputerSciences, 1996, E79-A(9): 1338-1354.[2]谷利则, 张胜, 杨义先. 一种新型的代理签名方案[J].电子与信息学报.2005, 27(9):1463-1466浏览[3]Hsu C L, Tsai K Y, and Tsai P L. Cryptanalysis andimprovement of nonrepudiable threshold multi-proxy multisignaturescheme [J]. Journal of Systems and Software, 2007,177(2): 543-549.[4]Lu E J L, Hwang M S, and Huang C J. A new proxy signaturescheme with revocation [J].Applied Mathematics andComputation.2005, 161(3):799-806[5]伊丽江. 代理签名体制及应用研究[D]. [博士论文], 西安电子科技大学, 2000.Yi Li-jiang. Study on proxy signature schemes and theirapplications [D]. Xidian University, 2000.[6]李媛, 尹为民. 一种具有双重性质的盲代理签名[J]. 计算机应用研究, 2003, 20(11): 16-19.Li Yuan and Yin Wei-min. A kind of blind proxy signaturewith dual property [J]. Application Research of Computers,2003, 20(11): 16-19. ..[7]康莉, 蔡勉, 王亚军. 基于Nyberg-Rueppel 签名体制的盲代理多重签名[J]. 通信学报, 2007, 28(3): 116-119.Kang Li, Cai Mian, and Wang Ya-jun. Blind proxy multisignatureschemes based on Nyberg-Rueppel signaturescheme[J]. Journal on Communications, 2007, 28(3): 116-119.
|