[1] |
NEAL K . Elliptic curve cryptosystems[J]. Mathematics of Computation, 1987,48(177): 203-209.
|
[2] |
杜洁璇 . 椭圆曲线密码系统的研究与实现[D]. 北京:北京邮电大学, 2010.
|
|
DU J X . Elliptic curve cryptography system research and implementation[D]. Beijing:Beijing University of Posts and Telecommunications, 2010.
|
[3] |
李湛 . 一种改进的椭圆曲线密码实现算法[J]. 电子科技, 2004(7): 31-33.
|
|
LI Z . An improved algorithm for Elliptic curve cryptography[J]. Electronic Science and Technology, 2004(7): 31-33.
|
[4] |
汪朝晖, 张振峰 . SM2椭圆曲线公钥密码算法综述[J]. 信息安全研究, 2016,2(11): 972-982.
|
|
WANG ZH , ZHANG Z F . Overview of SM2 Elliptic curve public key cryptography[J]. Information Security Research, 2016,2(11): 972-982.
|
[5] |
MAMBO M , USUDA K , OKAMOTO E . Proxy signatures for delegating signing operation[C]. . ACM Conference on Computer and Communications Security, 1996: 48-57.
|
[6] |
白国强, 黄谆, 陈弘毅 ,等. 基于椭圆曲线的代理数字签名[J]. 电子学报, 2003,31(11): 1659-1663.
|
|
BAI G Q , HUANG Z , CHEN H Y ,et al. Proxy digital signature based on elliptic curve[J]. Acta Electronic Journal, 2003,31(11): 1659-1663.
|
[7] |
张宁, 傅晓彤, 肖国镇 . 对基于椭圆曲线的代理签名的研究与改进[J]. 西安电子科技大学学报, 2005,32(2): 280-283.
|
|
ZHANG N , FU X T , XIAO G Z . Study and improvement of agent signature based on Elliptic Curve[J]. Journal of Xidian University, 2005,32(2): 280-283.
|
[8] |
CHANG M H , CHEN I T , CHEN M T . Design of Proxy Signature in ECDSA[C]// Eighth International Conference on Intelligent Systems Design and Applications,2008. 2008: 17-22.
|
[9] |
胡兰兰, 郑康锋, 杨义先 ,等. 一种改进的椭圆曲线安全代理签名方案倡[J]. 计算机应用研究, 2010,27(2).
|
|
HU L L , ZHENG K F , YANG Y X ,et al. An improved elliptic curve security proxy signature scheme[J]. Journal of Computer Applications, 2010,27(2).
|
[10] |
李继国, 曹珍富, 李建中 ,等. 代理签名的现状与进展[J]. 通信学报, 2003(10): 114-124.
|
|
LI J G , CAO Z F , LI J Z ,et al. Status and progress of proxy signature[J]. Journal of Communications, 2003(10): 114-124.
|
[11] |
DIFFIE W , HELLMAN M . Multiuser cryptographic techniques[J]. Proceedings of AFIPS 1976 NCC, 1976: 109-112.
|
[12] |
DIFFIE W . The first ten years of public-key Cryptography[J]. IEEE, 1992: 135-175.
|
[13] |
周亮 . 代理签名及扩展的关键问题研究[D]. 北京:北京邮电大学, 2008.
|
|
ZHOU L . Proxy signature and expansion of the key issues[D]. Beijing:Beijing University of Posts and Telecommunications, 2008.
|
[14] |
LEE B , KIM H , KIM K . Strong proxy signature and its applications[J]. SCIS. 2001.
|
[15] |
VARADHARAJAN V , ALLEN P , BLACK S . An analysis of the proxy problem in distributed systems[C]// 1991 IEEE Computer Society Symposium on Research in Security and Privacy, 1991: 255-275.
|
[16] |
张焕国 . SM2数字签名算法[EB/OL]. .
|
|
ZHANG H G . SM2 digital signature algorithm[EB/OL]. .
|