共 16 条
[1]
Al-Riyami S., Paterson K., Certificateless public key cryptography, LNCS, 2894, pp. 452-473, (2003)
[2]
Barreto P., Kim H., Lynn B., Scott M., Efficient algorithms for pairing-based cryptosystems, LNCS, 2442, pp. 354-368, (2002)
[3]
Boneh D., Lynn B., Shacham H., Short signatures from the weil pairings, LNCS, 2248, pp. 514-532, (2001)
[4]
Cha J., Cheon J., An identity-based signature from Gap Diffie-Hellman groups, Cryptology ePrint Archive: Report, 2002, 18
[5]
Galbraith S., Harrison K., Soldera D., Implementing the Tate pairing, LNCS, 2369, pp. 324-337, (2002)
[6]
Hess F., Efficient identity based signature schemes based on pairings, LNCS, 2595, pp. 310-324, (2003)
[7]
Kim S., Park S., Won D., Proxy signatures, revisited, LNCS, 1334, pp. 223-232, (1997)
[8]
Lee B., Kim H., Kim K., Strong proxy signature and its applications, Proc. of SCIS 2001, pp. 603-608, (2001)
[9]
Lee Y., Lee H., An authenticated certificateless public key encryption scheme, Cryptology ePrint Archive: Report, 2004, 150
[10]
Mambo M., Usuda K., Okamoto E., Proxy signature: Delegation of the power to sign messages, IEICE Trans. Fundamentals, E79-A, 9, pp. 1338-1353, (1996)