Formal model of proxy multi-signature and a construction

被引:0
|
作者
Department of Computer Science and Engineering, Shanghai Jiaotong University, Shanghai 200240, China [1 ]
机构
来源
Jisuanji Xuebao | 2006年 / 9卷 / 1628-1635期
关键词
9;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [21] A Secure Anonymous Proxy Multi-signature Scheme
    Saraswat, Vishal
    Sahu, Rajeev Anand
    [J]. 2014 11TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY (SECRYPT), 2014, : 55 - 66
  • [22] New multi-proxy multi-signature schemes
    Hwang, SJ
    Chen, CC
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2004, 147 (01) : 57 - 67
  • [23] Proxy Multi-Signature Binding Positioning Protocol
    Xue, Qingshui
    Cao, Zhenfu
    Li, Fengying
    [J]. 2014 IEEE/CIC INTERNATIONAL CONFERENCE ON COMMUNICATIONS IN CHINA (ICCC), 2014, : 166 - 170
  • [24] A New Anonymous Proxy Multi-Signature Scheme
    Yin Xin-chun
    Ou Fu-na
    [J]. PROCEEDINGS OF THE 14TH YOUTH CONFERENCE ON COMMUNICATION, 2009, : 445 - 448
  • [25] Structured Proxy Multi-Signature Scheme with Fingerprint
    Zhang, Jianhong
    Ji, Cheng
    [J]. NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 724 - 727
  • [26] Independent verification of proxy multi-signature scheme
    College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, 210016, China
    [J]. Int. J. Comput. Sci. Eng., 4 (301-311):
  • [27] Attack and Improvement of a Proxy Multi-Signature Scheme
    Wei Hong-ru
    Hu Jia-yuan
    [J]. PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ELECTRONIC TECHNOLOGY, 2016, 48 : 60 - 63
  • [28] Independent verification of proxy multi-signature scheme
    Du, He
    Wang, Jian
    Liu, Ya-Nan
    [J]. INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING, 2014, 9 (04) : 301 - 311
  • [29] A NEW THRESHOLD MULTI-PROXY MULTI-SIGNATURE SCHEME
    Kang Baoyuan Han Jingguang Wang Qinju (College of Mathematic Science and Computing Technology
    [J]. Journal of Electronics(China), 2006, (04) : 560 - 563
  • [30] Insider attacks on multi-proxy multi-signature schemes
    Guo, Lifeng
    Wang, Guilin
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2007, 33 (02) : 88 - 93