[1]Shamir A. Identitybased cryptosystems and signature schemes[C]// Proceedings of Crypto. New York:SpringerVerlag, 1984:47-53.
[2]Fiat A,Shamir A. How to prove yourself: Practical solutions to identification and signature problems[C]// Advances in Cryptology(CRYPTO’86).Berlin:Springer, 1986:186-194.
[3]Guillou L, Quisquater J J. A paradoxical identitybased signature scheme resulting from zeroknowledge[C]// Advances in Cryptology(CRYPTO’88).Berlin:Springer,1988:216-231.
[4]Mambo M, Usuda K, Okamoto E. Proxy signatures for delegating signing operation[C]// Proceedings of the 3rd ACM Conference on Computer and Communications Security. 1996:48-57.
[5]Mambo M, Usuda K, Okamoto E. Proxy signature: Delegation of the power to sign messages[J]. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 1996,E79A(9):1338-1353.
[6]Zhang Kan. Threshold proxy signature schemes[M]// Information Security. Berlin:SpringerVerlag, 1997:282-290.
[7]Hsu C,Wu T, Wu T. New nonrepudiable threshold proxy signature scheme with known signers[J]. Journal of Systems and Software, 2001,58(2):119-124.
[8]Hu Jianghong, Zhang Jianzhong. Cryptanalysis and improvement of a threshold proxy signature schem[J]. Computer Standards & Interfaces, 2009,31(1):169-173.
[9]Anderson R. Invited lecture[C]// Proceedings of the 4th ACM Conference on Computer and Communications Security. 1997:1-7.
[10]高欢欢, 张建中. 一种基于身份的门限代理签名方案[J]. 计算机工程, 2012,38(1):132-134.
[11]田志刚,鲍皖苏. 基于身份的门限代理签名方案[J]. 计算机工程与应用, 2009,45(9):117-119.
[12]王艳,于佳,李大兴. 前向安全的基于身份的代理签名方案[J]. 计算机工程与设计, 2007,28(21):5103-5104.
[13]张学军,张岳. 基于身份前向安全的代理签名方案[J]. 计算机工程与应用, 2012,48(19):66-68.
[14]张建中,薛荣红. 基于身份的门限代理签名方案[J]. 计算机工程, 2011,4(1):172-173.
[15]孙梅,魏仕民,赵兵. 前向安全门限代理签名方案的分析与改进[J]. 计算机工程与应用, 2010,46(36):109-129.
[16]王勇兵,王小杰. 基于身份前向安全的代理签名方案的安全性分析[J]. 西北师范大学学报, 2012,48(1):44-45.
[17]曹喆,王以刚. 基于USBKey的身份认证机制的研究与实现[J]. 计算机应用与软件, 28(2):284-286.
|