[1] |
BLAZE M , BLEUMER G , STRUSS M . Divertible protocols and atomic proxy cryptography[C]// EUROCRYPT’98. 1998: 127-144.
|
[2] |
HU X , LIU Y , XU H ,et al. Analysis and improvement of certificateless signature and proxy re-signature schemes[C]// 2015 IEEE Advanced Information Technology,Electronic and Automation Control Conference. 2015: 166-170.
|
[3] |
JIANG M M , HU Y P , WANG B C ,et al. Lattice-based multi-use unidirectional proxy re-encryption[J]. Security and Communication Networks, 2015,8(18): 3796-3803.
|
[4] |
ATENIESE G , HOHENBERGER S . Proxy re-signatures:new definitions,algorithms,and applications[C]// The 12th ACM CCS. 2005: 310-319.
|
[5] |
CANETTI R , GOLDREICHO O , HALEVI S . The random oracle methodology,revisited[J]. Journal of the ACM, 2004,51(4): 557-594.
|
[6] |
SHAO J , CCAO Z , WANG L ,et al. Proxy re-signature schemes without random oracles[C]// INDO-CRYPT 2007. 2007: 197-209.
|
[7] |
KIM K , YIE I , LIM S . Remark on shao et al's bidirectional proxy re-signature scheme in indocrypt'07[J]. International Journal of Network Security, 2009,8(3): 308-311.
|
[8] |
TIAN M . Identity-based proxy re-signatures from lattices[J]. Information Processing Letters, 2015,115(4): 462-467.
|
[9] |
CHEN L , CHEN X , SUN Y ,et al. A new certificateless proxy re-signature scheme in the standard model[C]// IEEE Computational Intelligence and Design. 2014: 202-206.
|
[10] |
YANG X , GAO G , WANG C . On-line/off-line threshold proxy re-signature scheme through the simulation approach[J]. Applied Mathematics & Information Sciences, 2015,9(6): 3251-3261.
|
[11] |
TIAN M M . Identity-based proxy re-signatures from lattices[J]. Information Processing Letters, 2015,115(4): 462-467.
|
[12] |
YANG X D , LI C M , LI Y ,et al. Divisible on-line/off-line proxy re-signature[J]. Applied Mathematics & Information Sciences, 2015,9(2): 759-767.
|
[13] |
邓宇乔, 杜明辉, 尤再来 ,等. 一种基于标准模型的盲代理重签名方案[J]. 电子与信息学报, 2010,32(5): 1219-1223.
|
|
DENG Y Q , DU M H , YOU Z L ,et al. A blind proxy re-signatures scheme based on standard model[J]. Journal of Electronics & Information Technology, 2010,32(5): 1219-1223.
|
[14] |
冯涛, 梁一鑫 . 可证安全的无证书盲代理重签名[J]. 通信学报, 2012,31(S1): 58-69.
|
|
FENG T , LIANG Y X . Provably secure certificate less blind proxy re-signatures[J]. Journal on Communications, 2012,31(S1): 58-69.
|
[15] |
胡小明, 杨寅春, 刘琰 . 一种基于标准模型的盲代理重签名方案的安全性分析和改进[J]. 小型微型计算机系统, 2011,32(10): 2008-2011.
|
|
HU X M , YANG Y C , LIU Y . Analysis and improvement of a blind proxy re-signature scheme based on standard model[J]. Journal of Chinese Computer Systems, 2011,32(10): 2008-2011.
|
[16] |
张延红, 陈明 . 标准模型下增强的基于身份部分盲签名[J]. 四川大学学报:工程科学版, 2014,46(1): 95-101.
|
|
ZHANG Y H , CHEN M . Extended identity-based partially blind signature scheme in the standard model[J]. Journal of Sichuan University(Engineering Science Edition), 2014,46(1): 95-101.
|
[17] |
TAHAT N , ADBALLAH E E . A proxy partially blind signature approach using elliptic curve cryptosystem[J]. International Journal of Mathematics in Operational Research, 2016,8(1): 87-95.
|