Funder
the 13th Five-Year Plan of National Cryptography Development Fund for Cryptographic Theory of China
Sichuan Science and Technology Project
Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering
Reference24 articles.
1. Blaze, M., Bleumer, G., & Strauss, M. (1998). Divertible protocols and atomic proxy cryptography. In Proceeding of international conference on the theory and application of cryptographic techniques, EUROCRYPT (pp. 127–144).
2. Ateniese, G., & Hohenberger, S. (2005). Proxy re-signatures: New definitions, algorithms, and applications. In Proceedings of the 12th ACM conference on computer and communications security (pp. 310–319).
3. Shao, J., Cao, Z., Wang, L., & Liang, X. (2007). Proxy re-signature schemes without random oracles. In Proceedings of the 8th international conference on cryptology in India, INDOCRYPT (pp. 197–209).
4. Libert, B., & Vergnaud, D. (2008). Multi-use unidirectional proxy re-signatures. In Proceedings of the 2008 ACM conference on computer and communications security (pp. 511–520).
5. Guo, D., Ping, W., Dan, Y., & Xiaoyuan, Y. (2010). A certificateless proxy re-signature scheme. In Proceedings of the 3rd international conference on computer science and information technology (Vol. 8, pp. 157–161). IEEE.
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献