Insider attack on threshold multi-proxy multi-signature scheme

被引:0
|
作者
Zhejiang Natural Science Foundation Committee, Hangzhou 310012, China [1 ]
不详 [2 ]
不详 [3 ]
机构
来源
J. Comput. Inf. Syst. | 2009年 / 5卷 / 1375-1380期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [1] A NEW THRESHOLD MULTI-PROXY MULTI-SIGNATURE SCHEME
    Kang Baoyuan Han Jingguang Wang Qinju (College of Mathematic Science and Computing Technology
    [J]. Journal of Electronics(China), 2006, (04) : 560 - 563
  • [2] A new threshold multi-proxy multi-signature scheme
    Baoyuan Kang Jingguang Han Qinju Wang (College of mathematics science and computing technology
    [J]. 信息安全与通信保密, 2005, (07) : 133 - 137
  • [3] A NEW THRESHOLD MULTI-PROXY MULTI-SIGNATURE SCHEME
    Kang Baoyuan Han Jingguang Wang Qinju College of Mathematic Science and Computing Technology Central South University Changsha China
    [J]. Journal of Electronics, 2006, (04) : 560 - 563
  • [4] Insider attacks on multi-proxy multi-signature schemes
    Guo, Lifeng
    Wang, Guilin
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2007, 33 (02) : 88 - 93
  • [5] Threshold multi-proxy multi-signature scheme based on bilinear pairings
    Wu, Tzong-Sun
    Lin, Han-Yu
    Shiu, Ming-Je
    [J]. WSEAS Transactions on Information Science and Applications, 2007, 4 (11): : 1393 - 1399
  • [6] Nonrepudiable multi-proxy multi-signature scheme
    Xue, QS
    Cao, ZF
    [J]. SYMPOTIC '04: JOINT IST WORKSHOP ON MOBILE FUTURE & SYMPOSIUM ON TRENDS IN COMMUNICATIONS, PROCEEDINGS, 2004, : 102 - 105
  • [7] An Ordered Multi-Proxy Multi-Signature Scheme
    Hwang, Min-Shiang
    Tzeng, Shiang-Feng
    Chiou, Shu-Fen
    [J]. ISDA 2008: EIGHTH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS, VOL 3, PROCEEDINGS, 2008, : 308 - +
  • [8] New multi-proxy multi-signature scheme
    School of Information Science and Engineering, Central South University, Changsha 410083, China
    [J]. Dianzi Keji Diaxue Xuebao, 2008, 5 (712-715):
  • [9] A nonrepudiable threshold multi-proxy multi-signature scheme with shared verification
    Tzeng, SF
    Yang, CY
    Hwang, MS
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2004, 20 (05): : 887 - 893
  • [10] Strongly unforgeable threshold multi-proxy multi-signature scheme with different proxy groups
    Liu, D.
    Wang, X.
    Huang, M.
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2014, 27 (12) : 3693 - 3705