[1] Tan Z, Liu Z, and Tang C. Digital Proxy Blind SignatureSchemes Based on DLP and ECDLP. MM Research Preprints,No.21, MMRC, AMSS, Academia, Sinica, Beijing, 2002,No.21: 212-217. [2] Lu Eric Jui-Lin, HWang Min-Shiang, and Huang Cheng-Jian.A new proxy signature scheme with revocation. AppliedMathematics and Computation, 2005, 161(3): 799-806. [3] 王晓明,张震,符方伟. 一个安全的门限代理签名方案[J].电子与信息学报.2006, 28(7):1308-1311浏览 [4] Abe M and Okamoto T. Provably secure partially blindsignatures. Advances in Cryptology: Crypto 2000, LNCS,Springer-Verlag, 2000: 271-286. [5] Mambo M, Usuda K, and Okamoto E. Proxy signatures:delegation of the power to sign messages. IEICE Trans.Fundamentals, 1996, E79-A(9): 1338-1354. [6] Mambo M, Usuda K, and Okamoto E. Proxy signatures fordelegating signing operation. Proc. 3rd ACM Conference onComputer and Communications Security, New Delhi: ACMPress, 1996: 48-57. [7] Wang S H, Wang G L, and Bao F, et al.. Cryptanalysis of aproxy-protected proxy signature scheme based on ellipticcurve cryptosystem. Vehicular Technology Conference, USA,IEEE 60th 2004: 3240-3243. [8] 李继国,曹珍富,李建中,等. 代理签名的现状与进展. 通信学报,2003, 24(10): 114-124.Li Ji-guo, Cao Zhen-fu, and Li Jian-zhong, et al.. Presentsituation and progress of proxy signature. Journal of ChinaInstitute of Communications, 2003, 24(10): 114-124.
|