참고문헌
- B. Lee, H. Kim, K. Kim, 'Strong Proxy Signature and its Applications'' Proc. of SCIS 2001
- M.Mambo, K.Usuda, and E.Okamoto, 'Proxy signatures: Delegation of the power to sign messages', In IEICE Trans. Fundamentals, Vol.E79-A, No.9, Sep 1996
- M.Abe, T. Okamoto, 'Provably secure partially blind suignatures', In Advances in Cyyptologt Crypto'2000
- M. Bellare and S. Miner, 'A forward-Secure digital signature scheme,' Crypto'99, 1999
- L.Yi, G.Bai and G.Xiao, 'Proxy multisignature scheme: A new type of proxysignature scheme', Electronics Letters,Vol.36, No.6, 2000
- K.Shum and Victor K. Wei, 'A strongproxy signatures scheme with proxy signerprivacy protection', Proceedings of theEleventh IEEE International Workshopson Enabling Technologies: Infrastructurefor Collaborative Enterphses, 2002
- D.Chaum and H.van Antwerpen, 'Undeni-able signatures', Advances in Cryptology-CRYPTO'89 Proceedings, Springer-Verlag, 1990
- D.Pointcheval and J. Stern, 'Securityproofs for signatures', In Advances inCryptology: Eurocrypt'96, Springer, 1996
- V.Varadharajan, P. Allen, and S. Black,'An analysis of the proxy problem indistributed systems.' Proc. IEEEComputer Sociery Symp. on Research inSecurity and Privacy, 1991
- P.Horster, M.Michels, H.Petersen 'Hiddensignature schemes based on the discretelogarithm problem and related concepts',Proc. of Communications and MultimediaSecurity'95, Chapman&Hall, 1995
- M. Mambo, K. Usuda, and E. Okamoto,'Proxy signatures: Delegation of thepower to sign message,' IEICE Trans.Fundamentals, Vol. E79-A, No. 9, 1996
- D.Chaum, 'Blind signatures foruntraceable payments', Advances inCryptology: Crypto'82, Prenum Publishing Corporation, 1982
- M.Cerecedo, T.Matsumoto, and H.Imai 'Efficient and secure multiparty generation of digital signatures based on discretelogarithms,' IEICE Trans. Fundamentals,1993
- B.C, Neuman, 'Proxy-based authorizationand accounting for distributed systems,'Proc. 13th International Conference onDistributed Computing Systems, 1993
- O.Delos and J. J.Quisquater, 'AnIdentity-Based Signature Scheme withBounded Life-Span,' Springer-Verlag,Advances in Cryptology, Proceedings ofCRYPTO, 1994
- J.Cha and J. Cheon, 'An Identity-basedSignature from Gap Diffie-HellmanGroups,' Springer-Verlag, Advances inCryptology, Proceedings of PKC, 2003
- N.Lee, T.Hwang, and C.Wang, 'OnZhang's Nonrepudiable Proxy SignatureScheme', in Proceedings of ACISP'98-Australasian Conference on InformationSecurity and Privacy, Vol. 1438 of Lecture Notes in Computer Science, 1998