1 Mambo M, Usuda K, Okamoto E. Proxy signature: Delegation of thepower to sign messages [J]. IEICE Transactions on Fundamentalsof Electronics, Communicaions and Computer Sciences, 1996, E79-A (9): 1338-1354.2 Kim S, Park S, Won D. Proxy signatures, revisited [C]// Proceedings of the International Conference on Information andCommunications Security. Berlin: Springer-Verlag, 1997: 223-232.3 Okamoto T, Tada M, Okamoto E. Extended proxy signatures for smartcards [C]// Proceedings of the Information Security Workshop.Berlin: Springer-Verlag, 1999: 247-258.4 Lee B, Kim H, Kim K. Secure mobile agent using strong non-designatedproxy signature [C]// Proceedings of the AustralasianConference on Information Security and Privacy. Berlin:Springer-Verlag, 2001: 474-486.5 Lee J Y, Cheon J H, Kim S. An analysis of proxysignatures: Is a secure channel necessary? [C]// Proceedings ofthe Cryptographer's Track at RSA Conference. Berlin:Springer-Verlag, 2003: 68-79.6 Wang Gui-lin, Bao Feng, Zhou Jian-yin, et al. Securityanalysis of some proxy signatures [C]// Proceedings of theInternational Conference on Information and CommunicationsSecurity. Berlin: Springer-Verlag, 2003: 305-319.7 Huang X, Mu Y, Susilo W, et al. Proxy signature withoutrandom oracles [C]// Proceedings of the InternationalConference on Mobile Ad-hoc and Sensor Networks. Berlin:Springer-Verlag, 2006: 473-484.8 Cao F, Cao Z. A secure identity-based multi-proxy signaturescheme [J]. Computers & Electrical Engineering, 2009, 35 (1): 86-95.9 Chaum D, Van Antwerpen H. Undeniable signatures [C]// Proceedings of Crypto. Berlin: Springer-Verlag, 1990: 212-216.10 Chaum D. Designated confirmer signatures [C]// Proceedings of Eurocrypt. Berlin: Springer-Verlag, 1994: 86-91.11 Chen X, Zhang F, Kim K. Limited verifier signaturefrom bilinear pairings [C]// Proceedings of the InternationalConference on Applied Cryptography and Network Security. Berlin:Springer-Verlag, 2004: 135-148.12 Jakobsson M, Sako K, Impagliazzo R. Designated verifier proofs andtheir applications [C]// Proceedings of Eurocrypt. Berlin:Springer-Verlag, 1996: 143-154.13 Lim C H, Lee P J. Modified Maurer-Yacobi's scheme and itsapplications [C]// Proceedings of the Australasian Conferenceon Information Security and Privacy. Berlin: Springer-Verlag, 1992:308-323.14 Lal S, Kumar M. A directed signature scheme and its applications[EB/OL]. (2004-9-19) [2010-12-30].http://arxiv.org/ftp/cs/papers/0409/0409036.pdf.15 Sunder L, Manoj K. A directed threshold-signature scheme [EB/OL].(2004-11-02) [2010-12-30].http://arxiv.org/ftp/cs/papers/0411/0411005.pdf.16 Laguillaumie F, Paillier P, Vergnaud D. Universally convertibledirected signatures [C]// Proceedings of Asiacrypt. Berlin:Springer-Verlag, 2005: 682-701.17 Lu R, Cao Z. A directed signature scheme based on RSAassumption [J]. International Journal of Network Security ,2006, 2 (3): 182-421.18 Lu R, Lin X, Cao Z, et al. New (t, n)threshold directed signature scheme with provable security [J]. Information Sciences, 2008, 178 (3): 756-765.19 Wei Q, He J, Shao H. A directed signature schemeand its application to group key initial distribution [C]// Proceedings of the International Conference on Interaction Sciences:Information Technology, Culture and Human. Seoul, Korea: ACM Press,2009: 265-269.20 Reddy P V, Rao B U, Gowri T. ID-based directed thresholdmultisignature scheme from bilinear pairings [J]. InternationalJournal on Computer Science and Engineering, 2009, 2 (1):74-79.21 Zhang J, Yang Y, Niu X. Efficient provablesecure ID-based directed signature scheme without random oracle[C]// Proceedings of the International Symposium on NeuralNetworks. Berlin: Springer-Verlag, 2009: 318-327.22 Waters R. Efficient identity-based encryption without random oracles[C]// Proceedings of Eurocrypt. Berlin: Springer-Verlag, 2005:114-127. |