|
[1] D. Chaum, “ Blind Signature System ” , Proceedings of Crypto 83, Plenum, pp.153, 1983. [2] D. Chaum, “ Blind signature for untraceable payment ” , Advances in Cryptology, proceeding of Crypto 82, Springer-Verlag, New York, pp.199-203, 1983. [3] M. Mambo, K. Usuda, E. Okamoto, “ Proxy signature delegation of the power to sign message ” , IEICE Transaction on Fundamentals, Vol. E79-A, No. 9, pp. 1338-1354, 1996. [4] Z. W. Tan, Z. J. Liu, C. M. Tang, “ A proxy blind signature scheme based on DLP ” , Journal of Software, Vol. 14, No. 11, pp. 1931-1935, 2003. [5] Q. S. Xue, Z. F. Cao, “ A new proxy blind signature scheme with warrant ” , IEEE Conference on Cybernetics and Intelligent Systems (CIS and RAM 2004), Singapore, pp. 1385-1390, 2004. [6] X. Yang, Z. P. Yu, “ Efficient Proxy Blind Signature Scheme based on DLP ” , International Conference on Embedded Software and Systems (ICESS2008), 2008. [7] A. N. Oo , N. Thein, “ DLP based proxy blind signature scheme with low-computation ”, Fifth International Joint Conference on INC and IDC, pp. 285-288, 2009. [8] M. Mambo, K. Usuda, E. Okamoto, “ Proxy Signature for delegating signing operation ” , Proc. 3rd ACM Conference on Computer and communications Security, ACM Press, pp. 48-57, 1996. [9] C. P. Schnorr, “ Efficient signature generation for smart cards ” , Journal of Cryptology, Vol. 4, pp. 161-174, 1991. [10] Z. He, L. Ge, “ ID-Based Signature Under the Schnorr Signature ” , 2008 4th International Conference on Wireless Communication, Networking and Mobile Computer, Dalian, pp. 1-3, 2008. [11] Long Zhang, Junhua Li, Lili Chen, Yajing Zhou, “ A undividable electronic cash scheme based on Schnorr digital signature ”, 2011 International Conference on Computer Science and Service System(CSSS), Nanjing, pp. 2951-2954, 2011.
|