1 Mambo M, Usuda K, Okamoto E. Proxy signature: Delegation of the
power to sign messages [J]. IEICE Transactions on Fundamentals
of Electronics, Communicaions and Computer Sciences, 1996,
E79-A (9): 1338-1354.
2 Kim S, Park S, Won D. Proxy signatures, revisited [C]//
Proceedings of the International Conference on Information and
Communications Security. Berlin: Springer-Verlag, 1997: 223-232.
3 Okamoto T, Tada M, Okamoto E. Extended proxy signatures for smart
cards [C]// Proceedings of the Information Security Workshop.
Berlin: Springer-Verlag, 1999: 247-258.
4 Lee B, Kim H, Kim K. Secure mobile agent using strong non-designated
proxy signature [C]// Proceedings of the Australasian
Conference on Information Security and Privacy. Berlin:
Springer-Verlag, 2001: 474-486.
5 Lee J Y, Cheon J H, Kim S. An analysis of proxy
signatures: Is a secure channel necessary? [C]// Proceedings of
the Cryptographer's Track at RSA Conference. Berlin:
Springer-Verlag, 2003: 68-79.
6 Wang Gui-lin, Bao Feng, Zhou Jian-yin, et al. Security
analysis of some proxy signatures [C]// Proceedings of the
International Conference on Information and Communications
Security. Berlin: Springer-Verlag, 2003: 305-319.
7 Huang X, Mu Y, Susilo W, et al. Proxy signature without
random oracles [C]// Proceedings of the International
Conference on Mobile Ad-hoc and Sensor Networks. Berlin:
Springer-Verlag, 2006: 473-484.
8 Cao F, Cao Z. A secure identity-based multi-proxy signature
scheme [J]. Computers & Electrical Engineering, 2009, 35 (1): 86-95.
9 Chaum D, Van Antwerpen H. Undeniable signatures [C]//
Proceedings of Crypto. Berlin: Springer-Verlag, 1990: 212-216.
10 Chaum D. Designated confirmer signatures [C]// Proceedings of Eurocrypt. Berlin: Springer-Verlag, 1994: 86-91.
11 Chen X, Zhang F, Kim K. Limited verifier signature
from bilinear pairings [C]// Proceedings of the International
Conference on Applied Cryptography and Network Security. Berlin:
Springer-Verlag, 2004: 135-148.
12 Jakobsson M, Sako K, Impagliazzo R. Designated verifier proofs and
their applications [C]// Proceedings of Eurocrypt. Berlin:
Springer-Verlag, 1996: 143-154.
13 Lim C H, Lee P J. Modified Maurer-Yacobi's scheme and its
applications [C]// Proceedings of the Australasian Conference
on Information Security and Privacy. Berlin: Springer-Verlag, 1992:
308-323.
14 Lal S, Kumar M. A directed signature scheme and its applications
[EB/OL]. (2004-9-19) [2010-12-30].
http://arxiv.org/ftp/cs/papers/0409/0409036.pdf.
15 Sunder L, Manoj K. A directed threshold-signature scheme [EB/OL].
(2004-11-02) [2010-12-30].
http://arxiv.org/ftp/cs/papers/0411/0411005.pdf.
16 Laguillaumie F, Paillier P, Vergnaud D. Universally convertible
directed signatures [C]// Proceedings of Asiacrypt. Berlin:
Springer-Verlag, 2005: 682-701.
17 Lu R, Cao Z. A directed signature scheme based on RSA
assumption [J]. International Journal of Network Security ,
2006, 2 (3): 182-421.
18 Lu R, Lin X, Cao Z, et al. New (t, n)
threshold directed signature scheme with provable security [J].
Information Sciences, 2008, 178 (3): 756-765.
19 Wei Q, He J, Shao H. A directed signature scheme
and its application to group key initial distribution [C]//
Proceedings of the International Conference on Interaction Sciences:
Information Technology, Culture and Human. Seoul, Korea: ACM Press,
2009: 265-269.
20 Reddy P V, Rao B U, Gowri T. ID-based directed threshold
multisignature scheme from bilinear pairings [J]. International
Journal on Computer Science and Engineering, 2009, 2 (1):
74-79.
21 Zhang J, Yang Y, Niu X. Efficient provable
secure ID-based directed signature scheme without random oracle
[C]// Proceedings of the International Symposium on Neural
Networks. Berlin: Springer-Verlag, 2009: 318-327.
22 Waters R. Efficient identity-based encryption without random oracles
[C]// Proceedings of Eurocrypt. Berlin: Springer-Verlag, 2005:
114-127. |