Citation: | YUAN Ding, FAN Pingzhi. Nonrepudiable Threshold Proxy Signature Scheme Based on Elliptic Curve Cryptography[J]. Journal of Southwest Jiaotong University, 2007, 20(1): 8-12. |
MAMBO M,USUDA K,OKAMOTO E.Proxy signatures:delegation of the power to sign messages[J].IEICE Transactions on Fundamentals of Electronic Communication and Computer Science,1996,E79-A(9):1 338-1 354.[2] MAMBO M,USUDA K,OKAMOTO E.Proxy signatures for delegating signing operation[C]//Proc.of the 3rd ACM Conference on Computer and Communications Security.New York:ACM,1996:48-57.[3] 李继国,李建中,曹珍富,等.具有已知代理人的不可否认门限代理签密方案[J].软件学报,2003,14(12):2 021-2 027.LI Jiguo,LI Jianzhong,CAO Zhenfu,et al.A nonrepudiable threshold proxy signcryption scheme with known proxy agent[J].Journal of Software,2003,14(12):2 021-2 027.[4] KIM S,PARK S,WON D.Proxy signatures,revisited[C]// ICICS'97,Lecture Notes in Computer Science.Berlin:Springer,1997,1 334:223-232.[5] ZHANG Kan.Threshold proxy signature schemes[C]//1997 Information Security Workshop.Ishikawa:Springer,1997:191-197.[6] SUN H M,LEE N Y,HWANG T.Threshold proxy signatures[J].IEE Proceeding-Computers and Digital Techniques,1999,146(5):259-263.[7] HSU C L,WU T S,WU T C.Improvement of threshold proxy signature scheme[J].Appl.Math.Comput.2003,136:315-321.[8] DENNING D.Cryptography and data security[M].Boston:Addison-Wesley,Reading,MA,1983.[9] E(l)GAMAL T.A public-key cryptosystem and a signature scheme based on discrete logarithms[J].IEEE Transactions on Information Theory.1985,IT-31(4):469-472.[10] 王衍波.椭圆曲线上密码研究现状与展望[J].解放军理工大学学报,2002,3(6):18-25.WANG Yanbo.View of the cryptology on elliptic curves[J].Journal of PLA University of Science and Technology,2002,3(6):18-25.[11] MEHTA M,HARN L.Efficient one-time proxy signatures[J].IEE Proc.Commun.,2005,152(2):129-133.[12] 范恒英,何大可,卿铭.公钥密码新方向:椭圆曲线密码学[J].通信技术,2002,127(7):82-84.FAN Hengying,HE Dake,QING Ming.New direction of public key cryptography:elliptic curve cryptography[J].Communications Technology,2002,127(7):82-84.[13] TRAPPE W,WASHINGTON L C.Introduction to cryptography with coding theory[M].New Jersey:Prentice Hall,2002.[14] 秦志光.密码算法的现状和发展研究[J].计算机应用,2004,24(2):1-4.QIN Zhiguang.Cryptography algorithm survey and trends[J].Computer Applications,2004,24(2):1-4.
|