[1] Mambo M, Usuda K, and Okamoto E. Proxy signatures: Delegation of the power to sign messages. IEICE Trans. on Fundamental. 1996, E78-A (9): 1378-1353. [2] Shum K and Weil V K. A strong proxy signature scheme with proxy signer privacy protection. Proceedings of the Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE02), Pittsburgh, Pennsylvania, USA, 2002: 55-56. [3] Lee Narn-Yih and Lee Ming-Feng. The security of a strong proxy signature scheme with proxy signer privacy protection[J].Applied Mathematics and Computation.2005, 161(3):807-812 [4] 谷利泽, 李中献, 杨义先. 不需要可信方的匿名代理签名方案[J].北京邮电大学学报.2005, 28(1):48-50 Gu Li-ze, Li Zhong-xian, and Yang Yi-xian. A anonymous proxy signature scheme without a trusted party. Journal of Beijing University of Posts and Telecommunications, 2005, 28(1): 48-50. [5] 柳菊霞,吴良杰,苏靖枫,付蓉. 匿名代理签名方案的研究与改进.信息安全与通信保密, 2006, 147(3): 75-77. Liu Ju-xia, Wu Liang-jie, Su Jing-feng and Fu Rong. Study and improvement of anonymous proxy signature scheme. China Information Security, 2006, 147(3): 75-77. [6] 谷利泽, 张胜, 杨义先. 一种新型的代理签名方案[J].电子与信息学报.2005,27(9):1463-1466浏览 Gu Li-ze, Zhang Sheng, and Yang Yi-xian. A new proxy signature scheme. Journal of Electronics and Information Technology, 2005, 27(9): 1463-1466.
|