Insider attack on threshold multi-proxy multi-signature scheme

被引:0
|
作者
Zhejiang Natural Science Foundation Committee, Hangzhou 310012, China [1 ]
不详 [2 ]
不详 [3 ]
机构
来源
J. Comput. Inf. Syst. | 2009年 / 5卷 / 1375-1380期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
下载
收藏
相关论文
共 50 条
  • [31] Efficient Multi-proxy Multi-Signature Schemes Based on DLP
    Chang, Ya-Fen
    Chang, Chin-Chen
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2006, 6 (2B): : 152 - 159
  • [32] Nonrepudiable proxy multi-signature scheme
    JiGuo Li
    ZhenFu Cao
    YiChen Zhang
    Journal of Computer Science and Technology, 2003, 18 : 399 - 402
  • [33] Nonrepudiable proxy multi-signature scheme
    Li, JG
    Cao, ZF
    Zhang, YC
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2003, 18 (03) : 399 - 402
  • [34] Cryptanalysis on a proxy multi-signature scheme
    Cao, Feng
    Cao, Zhenfu
    FIRST INTERNATIONAL MULTI-SYMPOSIUMS ON COMPUTER AND COMPUTATIONAL SCIENCES (IMSCCS 2006), PROCEEDINGS, VOL 2, 2006, : 117 - +
  • [35] New proxy multi-signature scheme
    Ji, Jia-Hui
    Li, Da-Xing
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2004, 41 (04): : 715 - 719
  • [36] Proxy multi-signature scheme: A new type of proxy signature scheme
    Yi, LJ
    Bai, GQ
    Xiao, GZ
    ELECTRONICS LETTERS, 2000, 36 (06) : 527 - 528
  • [38] A New Proxy Multi-Signature Scheme
    Xiong, Jiang Guan
    2009 INTERNATIONAL CONFERENCE ON NETWORKING AND DIGITAL SOCIETY, VOL 2, PROCEEDINGS, 2009, : 20 - 23
  • [40] Improvement of multi-proxy signature scheme
    Xue, QS
    Cao, ZF
    FOURTH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY, PROCEEDINGS, 2004, : 450 - 455