References
- ElGamal , T. 1985 . Public key cryptosystem and a signature scheme based on discrete logarithms . IEEE Transactions on Information Theory , 31 ( 4 ) : 469 – 472 .
- Huang , H. F. and Chang , C. C. 2003 . An efficient and practical (t, n) threshold proxy signature scheme with known signers . Fundamenta Informaticae , 56 ( 3 ) : 243 – 253 .
- Huang , H. F. and Chang , C. C. 2006 . A novel efficient (t, n) threshold proxy signature scheme . Information Sciences , 176 ( 10 ) : 1338 – 1349 .
- Hwang , M. S. , Lin , I. C. and Lu , E. J. L. 2000 . Secure nonrepudiable threshold proxy signature scheme with known signers . International Journal of Informatica , 11 ( 2 ) : 1 – 8 .
- Hwang , M. S. , Lu , E. J. L. and Lin , I. C. 2003 . Practical (t, n) threshold proxy signature scheme based on the RSA cryptosystem . IEEE Transactions on Knowledge and Data Engineering , 15 ( 6 ) : 1552 – 1560 .
- Lin , M. H. , Chang , C. C. and Chen , Y. R. 2004 . Fair and secure mobile agent environment based on blind signature and proxy host . Computers & Security , 23 : 199 – 212 .
- Mambo , M. , Usuda , K. and Okamoto , E. 1996 . Proxy signatures: delegation of the power to sign message . IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences , E79-A ( 9 ) : 1338 – 1354 .
- Mambo , M. , Usuda , K. and Okamoto , E. Proxy signatures for delegation signing operation . Proceedings of the Third ACM Conference on Computer and Communication Security . New Delhi , India . pp. 48 – 57 . in
- Park , J. H. , Kang , B. G. and Han , J. W. 2005 . Cryptanalysis of Zhou et al. proxy-protected signature schemes . Applied Mathematics and Computation , 169 ( 1 ) : 192 – 197 .
- Park , J. H. and Kang , B. G. 2005 . Security of Lu et al. proxy-protected signature scheme . Applied Mathematics and Computation , 169 ( 2 ) : 1010 – 1015 .
- Rabin , M. O. 1978 . Digitalized Signatures, Foundations of Secure Communication , 155 – 168 . Academic Press .
- Rivest , R. , Shamir , A. and Adleman , L. 1978 . Method for obtaining digital signatures and public-key cryptosystems . Communications of ACM , 21 ( 2 ) : 120 – 126 .
- Wang , G. , Bao , F. , Zhou , J. and Deng , R. H. 2004 . Comments on practical (t, n) threshold proxy signature scheme based on the RSA cryptosystem . IEEE Transactions on Knowledge and Data Engineering , 16 ( 10 ) : 1309 – 1311 .
- Zhou , Y. , Cao , Z. and Lu , R. 2005 . Provably secure proxy-protected signature schemes based on factoring . Applied Mathematics and Computation , 164 ( 1 ) : 83 – 98 .