1. Shamir A. Identity-based cryptosystems and signature schemes. Advances in Cryptology-Crypto,1984. Berlin: Springer-Verlag, 1984: 47-53
2. Boneh D, Franklin M. Identity-based encryption from the Weil pairings. Advances in Cryptology-Crypto, 2001. Berlin: Springer- Verlag, 2001: 213-229
3. Cha J C, Cheon J H. An identity-based signature from gap Diffie-Hellman groups. PKC, 2003. Berlin: Springer-Verlag, 2003: 18-30
4. Hess F. Efficient identity based signature schemes based on pairings. SAC, 2002. Berlin: Springer-Verlag, 2002: 310-324
5. Li Li-yuan, Xu Qiu-liang. A threshold proxy signature scheme with actual signers. Journal of Beijing University of Posts and Telecommunications, 2006, 29(4): 103-106 (in Chinese)
6. Shamir A. How to share a secret. Communications of the ACM, 1979, 22(11): 612-613
7. Jia Xiao-yun, Luo Shou-shan, Yuan Chao-wei. A new signature scheme with shared verification. The Journal of China Universities of Posts and Telecommunications, 2006,13(2): 66-69
8. Mi Jun-li, Zhang Jian-zhong. Newdynamic threshold signature scheme. Journal of Chongqing University of Posts and Telecommunications, 2006, 18(3): 390-392 (in Chinese)
9. Mambo M, Usuda K, Okamoto E. Proxy signature for delegating signing operation. Proceedings of the 3rd ACM Conference on Computer and Communications Security, Mar 14-16, 1996, New Delhi, India. New York, NY, USA: ACM, 1996: 48-56
10. Seo S H, Shim K A, Lee S H. A mediated proxy signature scheme with fast revocation for electronic transactions. Porceedings of 2nd International Conference on Trust, Privacy and Security in Digital Business, Aug 22-26, 2005, Copenhagen, Denmark. Berlin: Springer-Verlag, 2005: 216-225
11. Schnorr C. Efficient identification and signature for smart cards. Advances in Cryptology-Eurocrypt, 1989. Berlin: Springer-Verlag, 1989:239-251
12. Cheng Xiang-guo, Liu Jing-mei, Wang Xin-mei. An identity- based signature and its threshold version. Proceedings of 19th International Conference on Advanced Information Networking and Applications: Vol 1, Mar 28-30, 2005, Taipei,, China. Piscataway, NJ, USA: IEEE, 2005: 973-977
13. Gennaro R, Jarecki S, Krawczyk H, et al. Robust threshold DSS signatures. Advances in Cryptology-Eurocrypt, 1996. Berlin: Springer-Verlag, 1996: 354-371
14. Baek J, Zheng Y. Identity-based threshold signature from the bilinear pairings. Proceedings of the International Conference on Information Technology: Coding and Computing: Vol 1, Apr 5-7, 2004, Las Vegas, NV. Piscataway, NJ, USA: IEEE Computer Society, 2004: 124-128
15. Boneh D, Ding X, Tsudik G, et al. A method for fast revocation of public key certificates and security capabilities. Proceedings of the 10th USENIX Security Symposium, Aug 13-17, 2001, Washington DC, USA. 2001: 297-308
16. Lee B, Kim H, Kim K. Strong proxy signature and its applications. Proceedings of the 2001 Symposium on Cryptography and Information Security: Vol 2, Jan 23-26, 2001, Oiso, Japan. 2001: 603-608 |