[1] Mambo M, Usuda K, Okamoto E. Proxy Signatures: Delegation of the Power to Sign Messages[J]. IEICE Trans. on Fundamentals, 1996, E79-A(9): 1338-1354. [2] Mambo M, Usuda K, Okamoto E. Proxy Signatures for Delegating Signing Operation[C]//Proc. of the 3rd ACM Conf. on Computer and Communications Security. [S. l.]: ACM Press, 1996. [3] Petersen H. Self-certified Keys-concepts and Applications[C]// Proc. of CMS’97. [S. l.]: IEEE Press, 1997. [4] Kim S, Park S. Proxy Signatures[C]//Proc. of IEEE Int’l Conf. on Information and Communications Security. Berlin, Germany: [s. n.], 1997. [5] Lee B, Kim H. Strong Proxy Signature and Its Applications[C]// Proc. of SCIS’01. [S. l.]: IEEE Press, 2001. [6] 彭丽慧, 张建中. 一种基于双线性对的代理签名方案[J]. 计算机工程, 2010, 36(24): 132-133. [7] Seo S H, Shim K A, Lee S H. A Mediated Proxy Signature Scheme with Fast Revocation for Electronic Transactions[C]//Proc. of the 2nd Int’l Conf. on Trust, Privacy and Security in Digital Business. Copenhagen, Denmark: [s. n.], 2005. [8] 禹 勇, 杨 波, 孙 颖, 等. 具有快速撤销功能的代理签名方案[J]. 西安电子科技大学学报: 自然科学版, 2007, 34(4): 638-641. [9] Liu Zhenhua, Hu Yupu, Zhang Xiangsong, et al. Secure Proxy Signature Scheme with Fast Revocation in the Standard Model[J]. The Journal of China Universities of Posts and Telecommunica- tions, 2009, 16(4): 116-124. [10] Sun Hung-Min. Design of Time-stamped Proxy Signatures with Traceable Receivers[J]. Computers and Digital Techniques, 2000, 147(6): 462-466. [11] Das M L, Saxena A. An Efficient Proxy Signature Scheme with Revocation[J]. International Journal Informatica, 2004, 15(4): 455- 464. [12] Hwang M S. A New Proxy Signature Scheme with Revocation[J]. Applied Mathematics and Computation, 2005, 161(3): 799-806. [13] Boneh D. A Method for Fast Revocation of Public Key Certifi- cates and Security Capabilities[C]//Proc. of the 10th USENIX Security Symposium. Washington D. C., USA: [s. n.], 2001.
|