1. Mambo M, Usuda K, Okamoto E. Proxy signature: delegation of the power to sign messages. IEICE Transactions on Fundamentals, 1996, 79?A(9): 1338?1353
2. Mambo M, Usuda K, Okamoto E. Proxy signature for delegating signing operation. Proceedings of the 3rd ACM Conference on Computer and Communications Security, Mar 14?16, 1996, New Delhi, India. New York, NY, USA: ACM, 1996: 48?56
3. Boldyreva A, Palacio A, Warinschi B. Secure proxy signature scheme for delegation of signing rights. [2003-5-20]. http:// eprint..iacr.org/2003/096
4. Huang X Y, Susilo W, Mu Y, et al. Proxy signature without random oracles. Proceedings of the 2nd International Conference on Mobile Ad-hoc and Sensor Net-works, Dec 13?15, 2006, Hong Kong, China. LNCS 4325. Berlin, German: Springer-Verlag, 2006: 473?484
5. Yu Y, Sun Y, Yang B, et al. Multi-proxy signature without random oracles. Chinese Journal of Electronics, 2008, 17(3): 475?480
6. Liu Z H, Hu Y P, Ma H. Secure proxy multi-signature scheme in the standard model. Proceedings of the 2nd International Conference on Provable Security (ProvSec’08), Oct 30?Nov 1, Shanghai, China. LNCS 5324. Berlin, German: Springer-Verlag, 2008: 127?140
7. Seo S H, Shim K A, Lee S H. A mediated proxy signature scheme with fast revocation for electronic transactions. Proceedings of the 2nd International Conference on Trust, Privacy and Security in Digital Business, Aug 22?26, 2005, Copenhagen, Denmark. LNCS 3592. Berlin, German: Springer-Verlag, 2005: 216?225
8. Sun H M. Design of time-stamped proxy signatures with traceable receivers. IEE Proceedings: Computers and Digital Techniques, 2000, 147(6): 462?466
9. Das M L, Saxena A, Gulati V P. An efficient proxy signature scheme with revocation. International Journal Informatica, 2004, 15(4): 455?464
10. Lu E J L, Hwang M S, Huang C J. A new proxy signature scheme with revocation. Applied Mathematics and Computation, 2005, 161(3): 799?806
11. Boneh D, Ding X H, Tsudik G, et al. A method for fast revocation of public key certificates and security capabilities. Proceedings of the 10th USENIX Security Symposium, Aug 13?17, 2001, Washington DC, USA. 2001: 297?308
12. Yu Y, Yang B, Sun Y. Identity-based threshold signature and mediated proxy signature schemes. The Journal of China University of Post and Telecommunications, 2007, 14(2): 69?74
13. Yu Y, Yang B, Sun Y, et al. Proxy signature scheme with fast revocation. Journal of Xidian University, 2007, 34(4): 638?641 (in Chinese)
14. Waters B. Efficient identity based encryption without random oracles. Proceedings of Advances in Cryptology-Eurocrypt 2005, May 22?26, 2005, Aarhus, Denmark. LNCS 3494. Berlin, German: Springer-Verlag, 2005: 114?127
15. Paterson K G, Schuldt J C N. Efficient identity based signatures secure in the standard model. Proceedings of the 11st Australasian Conference Information Security and Privacy, Jul 3?5, 2006, Melbourne, Australia. LNCS 4508. Berlin, German: Springer-Verlag, 2006: 207?222
16. Bellare M, Rogaway P. Random oracles are practical: a paradiam for designing efficient protocols. Proceedings of the 1st ACM Conference on Computer and Communication Security(CCS’93), Nov 3?5, 1993, Fairfax, VA, USA. New York, NY, USA: ACM, 1993: 62?73
17. Canetti R, Goldreich O, Halevi S. The random oracle methodology, revisted. Journal of the ACM, 2004, 51(4): 557?594
|