Kim S J.[J].Park S J, and Won D H. Nominative signatures.Proc. of ICEIC95, International Conference on Electronics,Information and Communications, Yanji, Jilin, China,August.1995,:-[2]Kim S J.[J].Park S J, and Won D H. Zero-knowledge nominativesignatures. Proc. of PragoCrypt96, International Conferenceon the Theory and Applications of Cryptology, Prague, Czech,September.1996,:-[3]Huang Z and Wang Y. Convertible nominative signatures.Proc. of Information Security and Privacy, ACISP 2004,Berlin: Springer-Verlag, 2004, LNCS 3108: 348-357.[4]Susilo W and Mu Y. On the security of nominative signatures.Proc. of Information Security and Privacy, ACISP 2005,Berlin: Springer-Verlag, 2005, LNCS 3574: 329-335.[5]Wang G and Bao F. Security remarks on a convertiblenominative signature scheme. Proc. of IFIP InternationalFederation for Information Processing, New Approaches forSecurity, Privacy and Trust in Complex Environments,Boston: Springer, 2007, Vol. 232: 265-275.[6]Liu D Y, Wong D S, and Huang X, et al.. Formal definitionand construction of nominative signature. Proc. of ICICS2007, Berlin: Springer-Verlag, 2007, LNCS 4861: 57-68.[7]Liu D Y, Chang S, and Wong D S, et al.. Nominativesignature from ring signature. Proc. of IWSEC 2007, Berlin:Springer-Verlag, 2007, LNCS 4752: 396-411.[8]Park H U and Lee I Y. A digital nominative proxy signaturescheme for mobile communication. Proc. of ICICS 2001,Berlin: Springer-Verlag, 2001, LNCS 2229: 451-455.[9]Seo S H and Lee S H. New nominative proxy signaturescheme for mobile communication. Proc. of SPI2003,Security and Protection of Information, Brno, CZ, 2003:149-154.[10]黄振杰, 郝艳华, 王育民. 指明签名与指明代理签名[J].电子与信息学报.2004, 26(12):1996-2001浏览
|