共 28 条
- [1] The insecurity of two proxy signcryption schemes: proxy credential forgery attack and how to prevent it [J]. JOURNAL OF SUPERCOMPUTING, 2014, 70 (03): : 1100 - 1119
- [2] Two proxy signcryption schemes from bilinear pairings [J]. CRYPTOLOGY AND NETWORK SECURITY, PROCEEDINGS, 2005, 3810 : 161 - 171
- [3] Identity-based proxy signcryption schemes [J]. INFORMATION SCIENCE AND MANAGEMENT ENGINEERING, VOLS 1-3, 2014, 46 : 1237 - 1242
- [4] Constructing secure warrant-based proxy signcryption schemes [J]. CRYPTOLOGY AND NETWORK SECURITY, PROCEEDINGS, 2005, 3810 : 172 - 185
- [5] Cryptoanlaysis of Two Proxy Blind Signature schemes with Proxy Revocation [J]. PROCEEDINGS OF THE 2009 2ND INTERNATIONAL CONGRESS ON IMAGE AND SIGNAL PROCESSING, VOLS 1-9, 2009, : 3189 - 3192
- [7] Forgery attack on one-time proxy signature and the improvement [J]. Quantum Information Processing, 2014, 13 : 2007 - 2016
- [8] Forgeability Attack of Two DLP-Base Proxy Blind Signature Schemes [J]. ADVANCES IN SWARM INTELLIGENCE, PT II, 2011, 6729 : 395 - +
- [10] Analysis of Forgery Attack on One-Time Proxy Signature and the Improvement [J]. International Journal of Theoretical Physics, 2016, 55 : 743 - 745