參考文獻 |
[1] A. Bakker, M. V. Steen, A.S. Tanenbaum, "A Law-abiding Peer-to-peer Network for Free-software Distribution," Proc. of NCA 2001, pp.60-67, 2001.
[2] A. K. Awasthi, S. Lal, "Proxy Blind Signature Scheme," IACR Cryptology ePrint Archive, Report 2003/072: http://eprint.iacr.org/2003/072/, 2003.
[3] C.J. Choi, Z. Kim, K. Kim, "Schnorr Signature Scheme with Restricted Signing Capability and Its Application," Proc. of Computer Security Symp., pp.385-390, 2003.
[4] M. L. Das, A. Saxena, V. P. Gulati, "An Ecient Proxy Signature Scheme with Revocation," Informatica, vol. 15, no. 4, pp.455-464, 2004.
[5] T. ElGamal, "A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms," Proc. of CRYPTO 84, LNCS vol. 196, pp.10-18, 1984.
[6] I. Foster, C. Kesselman, G. Tsudik, S. Tuecke, "A Security Architecture for Computational Grids," CCS ’98 Proc. of the 5th ACM conference on Computer and communications security, pp.83-92, 1998.
[7] L. C. Guillou, J.J. Quisquater, "A Practical Zero-Knowledge Protocol Fitted to Security Microprocessor Minimizing Both Transmission and Memory," Proc. of EUROCRYPT 88, LNCS vol. 330, pp.123-128, 1988.
[8] X. Hong, K.F. Chen, "Secure Multiple-times Proxy Signature Scheme," Computer Standards and Interfaces, vol. 31, no. 1, pp.19-23, 2009.
[9] S. Kim, S. Park, D. Won, "Proxy Signatures, Revisited," Proc. of ICIS ’97, LNCS vol. 1334, pp.223-232, 1997.
[10] H. Kim, J. Baek, B. Lee, K. Kim, "Secret Computation with Secrets for Mobile Agent Using One-time Proxy Signature," Proc. of SCIS 2001, 2001.
[11] H. Krawczyk, T. Rabin, "Chameleon Signatures," Proc. of NDSS, pp.143-154, 2000.
[12] B. Lee, H. Kim, K. Kim, "Strong Proxy Signature and Its Applications," Proc. of SCIS 2001, 2001.
[13] E. J.L. Lu, M.S. Hwang, C.J. Huang, "A New Proxy Signature Scheme with Revocation" Applied Mathematics and Computation, vol. 161, no. 3, pp.799-806, 2005.
[14] Z. H. Liu, Y. P. Hu, X. S. Zhang, H. Ma, "Secure Proxy Signature Scheme with Fast Revocation in the Standard Model," The Journal of China Universities of Posts and Telecommunications, vol. 16, no. 4, pp.116-124, 2009.
[15] B. Lee, H. Kim, K. Kim, "Secure Mobile Agent Using Strong Non-designated Proxy Signature," Proc. of ACISP 2001, LNCS vol. 2119, pp.474-486, 2001.
[16] Y.C. Liu, H.A. Wen, C.L. Lin, T. Hwang, "Proxy-protected Signature Secure Against the Undelegated Proxy Signature Attack," Computers and Electrical Engineering, vol. 33, no. 3, pp.177-185, 2007.
[17] R. C. Merkle, "A Digital Signature Based on a Conventional Encryption Function," Proc. of CRYPTO 87, LNCS vol. 293, pp.369-378, 2006
[18] M. Mambo, K. Usuda, E. Okamoto, "Proxy Signatures: Delegation of the Power to Sign Messages," IEICE Trans. on Fundamentals of Electronics, Communications and Computer Sciences, vol. E79-A, no. 9, pp.1338-1354, 1996.
[19] M. Mehta, L. Harn, "Ecient One-time Proxy Signatures," IEE Proceedings: Communications, vol. 152, pp.129-133, 2005.
[20] NIST, "Digital Signature Standard (DSS)," Federal Information Processing Standards PUB 186-2, February 2000.
[21] B.C. Neuman, "Proxy Based Authorization and Accounting for Distributed Systems," Proc. of the 13th International Conference on Distributed Computing Systems, pp.283-291, 1993.
[22] T. Okamoto, M. Tada, E. Okamoto, "Extended Proxy Signatures for Smart Cards," Proc. of ISW 99 , LNCS vol. 1729, pp.247-258, 1999.
[23] H.U. Park, I.Y. Lee, "A Digital Nominative Proxy Signature Scheme for Mobile Communication," Proc. of ICICS 2001, LNCS vol. 2229, pp.451-455, 2001.
[24] R. L. Rivest, A. Shamir, and L. Adleman, "A Method for Obtaining Digital Signatures and Public-Key Cryptosystem," Communications of the ACM, vol. 21, no. 2, pp. 120-126, 1978.
[25] C. P. Schnorr, "Ecient Signature Generation by Smart Cards," Journal of Cryptology, vol. 4, no. 3, pp.161-174, 1991.
[26] Z. Shao, "Proxy Signature Schemes Based on Factoring," Information Processing Letters, vol. 85, no. 3, pp.137-143, 2003.
[27] H. Sun, N.Y. Lee, T. Hwang, "Threshold Proxy Signatures," IEE Proceedings: Computers and Digital Techniques, vol. 146, pp.259-263, 1999.
[28] A. Shamir, Y. Tauman, "Improved Online/Oine Signature Schemes," Proc. of CRYPTO 2001, LNCS vol.2139, pp.355-367, 2001.
[29] H.M. Sun, "An Ecient Nonrepudiable Threshold Proxy Signature Scheme with Known Signers" Computer Communications, vol. 22, no. 8, pp.717-722, 1999.
[30] H.M. Sun, "Design of Time-stamped Proxy Signatures with Traceable Receivers," IEE Proceedings: Computers and Digital Techniques, vol. 147, no. 6, pp.462-466, 2000.
[31] Z. Tan, Z. Liu, C. Tang, "Digital Proxy Blind Signature Schemes Based on DLP and ECDLP," MM Research preprints, no. 21, pp.212-217, 2002.
[32] G. Wang, F. Bao, J. Zhou, R.H. Deng, "Security Analysis of Some Proxy Signatures," Proc. of ICISC 2003, LNCS vol. 2971, pp.305-319, 2004.
[33] H. Wang, J. Pieprzyk, "Ecient One-time Proxy Signatures," Proc. of ASIACRYPT 2003, LNCS vol. 2894, pp.507-522, 2003.
[34] S.M. Yen, "Design and Computation of Public Key Cryptosystems," Ph.D. dissertation, Department of Electrical Engineering, National Cheng Kung University, Taiwan, Section 3.4 O-line delegation for signing signature, 1994.
[35] K. Zhang, "Threshold Proxy Signature Schemes," Proc. of ISW ’97, LNCS vol. 1396, pp.282-290, 1998.
[36] F. Zhang, R. Safavi-Naini, C.Y. Lin, "New Proxy Signature, Proxy Blind Signature and Proxy Ring Signature Schemes from Bilinear Pairing," IACR Cryptology ePrint Archive, Report 2003/104: http://eprint.iacr.org/2003/104/, 2003.
[37] Y. Zhou, Z. Cao, R. Lu, "Provably Secure Proxy-protected Signature Schemes Based on Factoring," Applied Mathematics and Computation, vol. 164, no. 1, pp.83-98, 2005. |