[1]Yang Piyi,Cao Zhenfu,Dong Xiaolei.Threshold proxy resignature[C]∥Proc of IPCCC’08, 2008:450455.
[2]Yang Xiaodong, Wang Caifen. Threshold proxy resignature schemes in the standard model[J]. Chinese Journal of Electronics, 2010, 19(2E):345350.
[3]Ateniese G, Hohenberger S. Proxy resignatures:New definitions, algorithms, and applications[C]∥Proc of the 12th ACM CCS, 2005:310319.
[4]Shao Jun, Wei Guiyi, Ling Yun, et al. Unidirectional identitybased proxy resignature[C]∥Proc of 2011 IEEE ICC, 2011:15.
[5]Guo Duntao, Wei Ping, Yu Dan, et al. A certificateless proxy resignature scheme[C]∥Proc of IEEE ICCSIT’10, 2010:157161.
[6]Yang Xiaodong,Wang Caifen.Efficient online/offline proxy resignature schemes[J]. Journal of Electronics & Information Technology, 2011, 33(12):29162921.(in Chinese)
[7]Hong Xuan, Chen Kefei, Wan Zhongmei. Simplified universally composable proxy resignature[J]. Journal of Software, 2010, 21(8):20792088. (in Chinese)
[8]Yang Xiaodong, Wang Caifen, Lan Caihui, et al. Flexible threshold proxy resignature schemes[J]. Chinese Journal of Electronics, 2011, 20(4E):691696.
[9]Sun Hua, Zhong Luo, Wang Aimin. Provably secure identitybased threshold ring signature in the standard model[J]. Computer Engineering & Science, 2013, 35(3):9296.(in Chinese)
附中文参考文献:
[6]杨小东,王彩芬.高效的在线/离线代理重签名方案[J].电子与信息学报,2011,33(12):29162921.
[7]洪璇,陈克非,万中美.简单的通用可组合代理重签名方案[J].软件学报,2010,21(8):20792088.
[9]孙华, 钟珞, 王爱民. 标准模型下可证安全的基于身份门限环签名[J]. 计算机工程与科学, 2013, 35(3):9296. |