Formal model of proxy multi-signature and a construction

被引:0
|
作者
Department of Computer Science and Engineering, Shanghai Jiaotong University, Shanghai 200240, China [1 ]
机构
来源
Jisuanji Xuebao | 2006年 / 9卷 / 1628-1635期
关键词
9;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [31] A NEW THRESHOLD MULTI-PROXY MULTI-SIGNATURE SCHEME
    Kang Baoyuan Han Jingguang Wang Qinju College of Mathematic Science and Computing Technology Central South University Changsha China
    [J]. Journal of Electronics, 2006, (04) : 560 - 563
  • [32] A new threshold multi-proxy multi-signature scheme
    Baoyuan Kang Jingguang Han Qinju Wang (College of mathematics science and computing technology
    [J]. 信息安全与通信保密, 2005, (07) : 133 - 137
  • [33] Multi-proxy multi-signature binding positioning protocol
    Xue, Qingshui
    Li, Fengying
    Chen, Huafeng
    Zhang, Huajun
    Cao, Zhenfu
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (16) : 3868 - 3879
  • [34] Multi-proxy Multi-signature Binding Positioning Protocol
    Chen, Huafeng
    Xue, Qingshui
    Li, Fengying
    Zhang, Huajun
    Cao, Zhenfu
    Hou, Jianwen
    [J]. WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, 2015, 9204 : 9 - 18
  • [35] A Proxy Multi-Signature Scheme with Forward-Secure
    Liang, Xiang-Qian
    Zhang, Yun
    Zhang, Yong-Hua
    [J]. PROCEEDINGS OF 2012 IEEE 14TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, 2012, : 794 - 798
  • [36] Forward secure certificateless proxy multi-signature scheme
    Gao, Ronghai
    Zeng, Jiwen
    [J]. INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2021, 13 (01) : 1 - 27
  • [37] Analysis and Improvement of Proxy Blind Multi-Signature Scheme
    Tang, Pengzhi
    Chen, Renqun
    [J]. FUZZY SYSTEMS, KNOWLEDGE DISCOVERY AND NATURAL COMPUTATION SYMPOSIUM (FSKDNC 2013), 2013, : 144 - 154
  • [38] Cryptanalysis of an identity based proxy multi-signature scheme
    Li, Fagen
    Zhou, Shijie
    Sun, Rong
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2008, E91A (07) : 1820 - 1823
  • [39] Security Analysis and The Improvement of Multi-Proxy Multi-signature Scheme
    Zhang, Xinghua
    [J]. APPLIED SCIENCE, MATERIALS SCIENCE AND INFORMATION TECHNOLOGIES IN INDUSTRY, 2014, 513-517 : 1680 - 1683
  • [40] Insider attack on threshold multi-proxy multi-signature scheme
    Zhejiang Natural Science Foundation Committee, Hangzhou 310012, China
    不详
    不详
    [J]. J. Comput. Inf. Syst., 2009, 5 (1375-1380):