1. Gu Li-ze, Zhang Sheng, Yang Yi-xian. An inproved proxy multi-signature scheme. The Journal of China Universities of Posts and Telecommunications, 2005, 12(1): 10-14
2. Jia Xiao-yun, Luo Shou-shan, Yuan Chao-wei. A new signature scheme with shared verification. The Journal of China Universities of Posts and Telecommunications, 2006, 13(2): 66-69
3. Mi Jun-li, Zhang Jian-zhong. New dynamic threshold signature scheme. The Journal of Chongqing University of Posts and Telecommunications: Natural Science, 2006, 18(3): 390-392 (in Chinese)
4. Li Li-yuan, Xu Qiu-liang. A threshold proxy signature scheme with actual signers. The Journal of Beijing University of Posts and Telecommunications, 2006, 29(4): 103-106 (in Chinese)
5. Steinfeld R, Bull L, Wang H, et al. Universal designated-verifier signatures. Proceedings of ASIACRYPT'03, Nov 30-Dec 4, 2003, Taipei, China. Berlin: Springer-Verlag, 2003: 523-542
6. Zhang Fang-guo, Susilo W, Mu Y, et al. Identity-based universal designated verifier signatures. In Proceedings of 2005 IFIP International Conference on Embedded and Ubiquitous Computing. Dec 6-9, 2005, Nagasaki, Japan. Berlin: Springer- Verlag , 2005: 825-834
7. Zhang R, Furukawa J, Imai H. Short signature and universal designated verifier signature without random oracles. Proceedings of Applied Cryptography and Network Security, Jun 7-10, 2005, New York, NY, USA. Berlin: Springer-Verlag, 2005: 483-498
8. Shamir A. Identity-based cryptosystems and signature schemes. In Proceedings of Crypto'84, Aug 19-22, 1984, Santa Barbara, CA, USA. Berlin: Springer-Verlag, 1985: 47-53
9. Al-Riyami S, Paterson K. G. Certificateless public key cryptography. Proceedings of ASIACRYPT'03, Nov 30-Dec 4, 2003, Taipei, China. Berlin: Springer-Verlag, 2003: 452-473
10. Yum D H, Lee P J. Generic construction of certificateless signature. In Proceedings of 9th Australasian Conference on Information Security and Privacy (ACISP'04), Jul 13-15, 2004, Sydney, Australia. Berlin: Springer-Verlag, 2004: 200-211
11. Gorantla M C, Saxena A. An efficient certificateless signature scheme. Proceedings of 2005 International Conference on Computational Intelligence and Security (CIS'05), Dec 15-19, 2005, Xi'an, China. Berlin: Springer-Verlag, 2005: 110-116
12. Li X, Chen K, Sun L. Certificateless signature and proxy signature schemes from bilinear pairings. Lithuanian Mathematical Journal, 2005, 45(1): 76-83
13. Zhang Zhen-feng, Wong Duncan S, Xu Jing, et al. Certificateless public-key signature: security model and efficient construction. Proceedings of 4th International Conference on Applied Cryptography and Network Security (ACNS'06), Jun 6-9, 2006, Singapore. Berlin: Springer-Verlag, 2006: 293-308
14. Boneh D, Franklin M. Identity-based encryption from the weil pairing. In Proceedings of Crypto'01, Aug 19-23, 2001, Santa Barbara, CA, USA. Berlin: Springer-Verlag, 2001: 213-229
15. Huang Xinyi, Susilo Willy, Mu Yi, et al. Certificateless designated verifier signature schemes. Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA'06), Apr 18-20, 2006, Vienna, Austria. Piscataway, NJ, USA: IEEE, 2006: 15-19
16. Pointcheval D, Stern J. Security proofs for signature schemes. Proceedings of Eurocrypt'96, May 12-16, 1996, Saragossa, Spain. Berlin: Springer-Verlag, 1996: 387-398
17. Lipmaa H, Wang G, Bao F. Designated verifier signature schemes: attacks, new security notions and a new construction. In Proceedings of 32nd International Colloquium on Automation, Languages and Programming (ICALP'05), Jul 11-15, 2005, Lisbon, Portugal. Berlin: Springer-Verlag, 2005: 459-471
18. Vergnaud D. New extensions of pairing-based signatures into universal designated verifier signatures. Proceedings of 32nd International Colloquium on Automation, Languages and Programming (ICALP'06), Jul 10-14, 2006, Venice, Italy. Berlin: Springer-Verlag, 2006: 58-69 |