Author:
Ghodosi Hossein,Pieprzyk Josef
Publisher
Springer Berlin Heidelberg
Reference6 articles.
1. T. ElGamal, “A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms,” IEEE Trans. on Inform. Theory, vol. IT-31, pp. 469–472, July 1985.
2. K. Nyberg and R. Rueppel, “A New Signature Scheme Based on the DSA Giving Message Recovery,” in Proceedings of 1st ACM Conference on Computer and Communications Security, 1993.
3. K. Zhang, “Threshold Proxy Signature Scheme,” 1997 Information Security Workshop, Japan, pp. 191–197, 1997.
4. K. Zhang, Nonrepudiable Proxy Signature Scheme. Manuscript, 1997.
5. Lect Notes Comput Sci;N. Lee,1998
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Amelioration of a proxy signature using RSA encryption;Proceedings of the 2nd International Conference on Networking, Information Systems & Security - NISS19;2019
2. Forgery Attack to Authentication of Anycast Communication;Applied Mechanics and Materials;2011-06
3. Identity Based Delegation Network;Progress in Cryptology – Mycrypt 2005;2005
4. Security Analysis of Some Proxy Signatures;Information Security and Cryptology - ICISC 2003;2004