References
- D.Chaum and H.Van Antwerpen, 'Undeniable signatures,' Proc. Cryptology-CRYPTO'89 Proceedings, Springer- Verlag, pp.458-464, 1990
- B.Lee, H.Kim and K.Kim, 'Self-certificate: PKI using self-certified key,' Proc. of Conference on Information Security and Cryptology, pp.1-9, 2000
- B.Lee, H.Kim and Y.Chang, 'Efficient proxy-protected proxy signature scheme based on discrete logarithm,' Proceedings of 10th Conference on Information Security, Hualien, Taiwan, ROC, pp.4-7, 2000
- L.Yi, G.Bai and G.Xiao, 'Proxy multi-signature scheme: A new type of proxy sig- nature scheme,' Electronics Letters, Vol.36, No.6, pp.527-528, 2000 https://doi.org/10.1049/el:20000422
- M.Abe and T.Okamoto, 'Provably secure partially blind signatures,' In. Advances in Cryptology Crypto'2000, pp.271-299, 2000
- M.Hwang, I.Lin and E.J.Lu, 'A secure nonrepudiable threshold proxy signature scheme with known signers,' International Journal of Informatica, vol.11 , no.2, pp.1-8, 2000
- S.M.Yen, C.P.Hung and Y.Y.Lee, 'Remarks on some proxy signature schemes,' Proceedings of the 2000 ICS: Workshop on Cryptology and Information Security, pp.54-59, 2000
- B.Lee, H.Kim and K.Kim, 'Strong proxy signature and its applications,' Proc. of SCIS 2001, International Conference on Information Security, pp.603-608, June. 2001
- D.R.Stinson and R.Strobl, 'A provably secure distributed Schnorr signatures and a(t,n) threshold scheme for implicit certificates,' Sixth Australasian Conference on Information Security and Privacy LNCS 2119, Springer-Verlag, pp.417-434, 2001
- G.Itkis and L.Reyzin, 'Forward-secure signatures with optimal signing and verifying,' Crypto'01, pp.68-72, 2001
- S.J.Hwang and C.C.Chen, 'A new proxy multi signature scheme,' International workshop on cryptology and network security, Tamkang University Taipei, Taiwan, pp.2628, 2001
- K.Shum and K.Wei, 'A strong proxy signatures scheme with proxy signer privacy protection,' Proceeding of Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, pp.55-56, 2002
- J.Cha and J.Cheon, 'An identity-based signature from gap diffie-hellman groups,' Springer-Verlag, Advances in Cryptology, Proceedings of PKC '03, LNCS 2567, pp. 18-30, 2003
- J.Hwang, D.Lee and J.Lim, 'Digital signature scheme with restriction on signing capability,' Proc. of ACISP 2003, LNCS voI.2727, pp.324-335, 2003