Computer Science ›› 2014, Vol. 41 ›› Issue (5): 133-136.doi: 10.11896/j.issn.1002-137X.2014.05.029
Previous Articles Next Articles
LIU Dan-ni,WANG Xing-wei and HUANG Min
[1] Itakura K,Nakamura K.A public-key cryptosystem suitable for digital multisignatures[J].NEC RES DEVELOP,1983(71):1-8 [2] Tzeng S,Yang C,Hwang M.A new multi-proxy multi-signature scheme[J].2002,0-138 [3] Hwang S J,Chen C C.New multi-proxy multi-signature schemes[J].Applied Mathematics and Computation,2004,7(1):57-67 [4] Tzeng S F,Yang C Y,Hwang M S.A nonrepudiable threshold multi-proxy multi-signature scheme with shared verification[J].Future Generation Computer Systems,2004,0(5):887-893 [5] Bao H Y,Cao Z F,Wang S B.Improvement on Tzeng et al.′s nonrepudiable threshold multi-proxy multi-signature scheme with shared verification[J].Applied Mathematics and Computation,2005,9(2):1419-1430 [6] Hsu C L,Tsai K Y,Tsai P L.Cryptanalysis and improvement of nonrepudiable threshold multi-proxy multi-signature scheme with shared verification[J].Inf Sci,2007,7(2):543-549 [7] Mashhadi S.Analysis of frame attack on Hsu et al.’s non-repudiable threshold multi-proxy multi-signature scheme with shared verification[C]∥Scientia Iranica.2012:1-6 [8] 霍亮,杨柳,李明祥.基于身份的多重代理签名的安全模型[J].计算机科学,2012,9(6A):41-43 [9] Kang B Y,Boyd C,Dawson E.A novel nonrepudiable threshold multi-proxy multi-signature scheme with shared verification[J].Computers & Electrical Engineering,2009,5(1):9-17 [10] Sun Y,Xu C X,Yu Y,et al.Improvement of a proxy multi-signature scheme without random oracles[J].COMPUT COMMUN,2011,4(3):257-263 [11] Liu Z H,Hu Y P,Zhang X S,et al.Provably secure multi-proxy signature scheme with revocation in the standard model [J].COMPUT COMMUN,2011,4(3):494-501 [12] Sun Y,Xu C X,Yu Y,et al.Improvement of a proxy multi-signature scheme without random oracles[J].COMPUT COMMUN,2011,4(3):257-263 [13] Waters B.Efficient identity-based encryption without randomoracles[M]∥Advances in Cryptology-EUROCRYPT Springer Berlin Heidelberg,2005:114-127 |
No related articles found! |
|