[1] |
BOLDYREVA A , PALACIO A , WARINSCHI B . Secure proxy signature schemes for delegation of signing rights[J]. Journal of Cryptology, 2012,25(1): 57-115.
|
[2] |
CHEN X , LENZINI G , MAUW S ,et al. A group signature based electronic toll pricing system[C]// International Conference on Availability,IEEE Computer Society. 2011: 85-93.
|
[3] |
SEVERENS M , FARQUHAR J , DUYSENS J ,et al. A multi-signature brain-computer interface:use of transient and steady-state responses[J]. Journal of Neural Engineering, 2013,10(10): 1160-1166.
|
[4] |
BLAZE M , BLEUMER G , STRAUSS M . Divertible protocols and atomic proxy cryptography[J]. Lecture Notes in Computer Science, 1998,1403: 127-144.
|
[5] |
ATENIESE G , HOHENBERGER S . Proxy re-signatures:new definitions,algorithms,and applications[C]// ACM Conference on Computer and Communications Security. 2005: 310-319.
|
[6] |
SHAO J , CAO Z , WANG L C ,et al. Proxy re-signature schemes without random oracles[C]// Progress in Cryptology-Indocrypt 2007,International Conference on Cryptology in India. 2007: 197-209.
|
[7] |
WATERS B , . Efficient identity-based encryption without random oracles[M]// Advances in Cryptology-EUROCRYPT 2005. Springer Berlin Heidelberg, 2005: 114-127.
|
[8] |
LIBERT B , VERGNAUD D . Multi-use unidirectional proxy resignatures[C]// ACM Conference on Computer and Communications Security.ACM. 2008: 511-520.
|
[9] |
YANG P , CAO Z , DONG X . Threshold proxy re-signature[J]. Journal of Systems Science &Complexity, 2008,24(4): 816-824.
|
[10] |
SHAMIR A . How to share a secret[J]. Communications of the ACM, 1979,22(11): 612-613.
|
[11] |
YANG X D , ZHANG L , WANG C F . A flexible threshold proxy re-signature scheme with provable security[J]. Computer Engineering&Science, 2014.
|
[12] |
FENG J , LAN C H , JIA B R . ID-based proxy resignature scheme with strong unforgeability[J]. Journal of Computer Applications, 2014.
|
[13] |
ZHANG Y L , YANG X D , WANG C F . ID-based bidirectional threshold proxy re-signature[J]. Journal of Computer Applications, 2011,31(1): 4920-4926.
|
[14] |
SHOR P W . Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer[J]. Siam Review, 1997,41(2): 1484-1509.
|
[15] |
JACQUES P , . Hidden fields equations (HFE) and isomorphisms of polynomials (IP):two new families of asymmetric algorithms[M]// Advances in Cryptology–EUROCRY- PT'96. Springer Berlin Heidelberg, 1996: 33-48.
|
[16] |
TANG S , XU L . Proxy signature scheme based on isomorphisms of polynomials[C]// Network and System Security(NSS) 2012. 2012: 113-125.
|
[17] |
刘文浩, 许春香 . 无证书两方密钥协商方案[J]. 软件学报, 2011,22(11): 2843-2852.
|
|
LIU W H , XU C X . Two party certificateless key agreement schemes[J]. Journal of Software, 2011,22(11): 2843-2852.
|