Author:
Xiong Hu,Hu Jianbin,Chen Zhong,Li Fagen
Subject
Electrical and Electronic Engineering,General Computer Science,Control and Systems Engineering
Reference22 articles.
1. Efficient generic forward-secure signatures and proxy signatures;Alomair,2008
2. Bellare M, Rogaway P. Random oracles are practical: a paradigm for designing efficient protocols. In: Proceedings of 1st ACM conference on computer and communications security, Fairfax, Virginia, USA; 1993. p. 62–73.
3. Bellare M, Namprempre C, Neven G. Security proofs for identity-based identification and signature schemes. In: Advances in cryptology – Eurocrypt 2004. LNCS, vol. 3027. Springer-Verlag; 2004. p. 268–86.
4. Boldyreva A, Palacio A, Warinschi B. Secure proxy signature schemes for delegation of signing rights. In: IACR ePrint archive; 2003. Available from: .
5. Boneh D, Franklin M. Identity-based encryption from the weil pairing. In: Proceedings of advances in cryptology – CRYPTO 2001. LNCS, vol. 2139. Springer-Verlag; 2001. p. 213–29.
Cited by
17 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献