Kim S J.[J].Park S J, Won D H. Nominative signatures. Proc. of ICEIC95, International Conference on Electronics, Information and Communications, Yanji, Jilin, China, August 7-1.1995,:-[2]Chaum D.[J].Antwcrpcn H. Undeniable signature. Proc. of Crypto89, LNCS 435, Berlin: SpringerVerlag.1989,:-[3]Chaum D. Zcro-knowledge undeniable signature. Proc. of Eurocrypt90, LNCS 473, Berlin:Springer-Vcrlag, 1990: 458-464.[4]Chaum D. Designated confirmcr signatures. Proc. of Eurocypt94, LNCS 950, Berlin: SpringerVerlag, 1994: 86-91.[5]Kim S J.[J].Park S J, Won D H. Zero-knowledge nominative signatures. Proc. of PragoCrypt96, International Conference on the Theory and Applications of Cryptology, Prague, Czech, September 30-October.1996,3:-[6]Park H U, Lee I Y. A digital nominative proxy signature scheme for mobile communication[J].Proc.of ICICS01, LNCS.2229, Berlin:-[7]Camenisch J. Efficient and generalized group signatures. Proc. of Eurocrypt97, LNCS1233,Berlin: Springer-Verlag, 1997: 465-479.[8]Schnorr C P. Efficient signature generation for smart cards. Journal of Cryptology, 1991, 4(3):161-174.[9]Lee B C, Kim H S, Kim K J. Strong proxy signature and its applications, SCIS01, the 2001 Symposium on Cryptography and Information Security. Oiso, Japan. January 2001: 603-608.
|