|
[1.] William Stallings, Cryptography and Network Security: Principles and Practice, Third Edition, Prentice Hall, August 2002. [2.] 曾育民, “數位簽章之類型及應用”, 資訊安全通訊 Vol.7 No.3, pp. 59-67, 2001. [3.] T. ElGamal, “A Public-Key Cryptysystem and Signature Scheme Based on Discrete Logrithms”, IEEE Transactions on Information Theory, Vol. IT-31, No.4, pp. 469-472, 1985. [4.] R. L. Revest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures and public-key cryptosystems”, Communications of ACM, Vol. 21, pp. 120-126, February 1978. [5.] Chen Yu-Yi, Jan, Jinn-Ke, Chen Chin-Ling, “The design of a secure anonymous Internet voting system”, Computers and Security Volume: 23, Issue: 4, pp. 330-337, June 2004. [6.] Chen Yu-Yi, Jan, Jinn-Ke, Chen, Chin-Ling, “Design of a fair proxy raffle protocol on the Internet”, Computer Standards & Interfaces Volume: 27, Issue: 4,April 2005, pp. 415-422. [7.] Carlo Blundo, Stelvio Cimato, “A Platform for Secure E-Gambling”, International Conference on Information Technology: Coding and Computing (ITCC'04) Volume 2, 2004. p. 768. [8.] D. Chaum, “Blind signatures for untraceable payments”, Advances in Cryptology: Proceedings Crypto’82, New York: Plenum Press, pp. 199-203, 1983. [9.] M. Stadler, J.M. Piveteau and J. Camenisch, “Fair Blind Signatures,” Advances in Cryptology :Eurocrypt’95, pp.209-219, 1995. [10.] J. L. Camenisch, J. M. Piveteau, M. A. Stadler, “Blind signatures based on the discrete logarithm problem”, Advances in Cryptology: Eurocrypt’94, Perugia, Italy, pp.428-432, 1994. [11.] P. Horster, M. Michels, H. Petersen, “Efficient blind signature schemes based on the discrete logarithm problem”, Technical Report TR-94-6, University of Technology Chemnitz-Zwichau, 4 pages, June 1994. [12.] E. Mohammed, A. E. Emarah, and K. El-Shennawy, “A blind signatures scheme based on ElGamal signature“, in IEEE/AFCEA EUROCOMM 2000 Information Systems for Enhanced Public Safety and Security, pp. 51-53, 2000. [13.] Fan Chun-I, “Improved low-computation partially blind signatures“, Applied Mathematics and Computation 145 (2003), pp.853-867. [14.] P.L. Yu and C.L. Lei, ” User Efficient Fair Blind Signatures”, Journal of Information Science and Engineering, accepted, 2000. [15.] Masahiro Mambo, Keisuke Usuda and Eiji Okamoto, “Proxy signatures for delegating signing operation”, Proceeding 3rd ACM Conference. on Computer and Communications Security, ACM Press, pp. 48-57 , March 1996. [16.] M. Mehta and L. Harn, “Efficient one-time proxy signatures”, IEE Proceedings of Communication. Vol. 152, no. 2, pp. 129-133, April 2005. [17.] H.M. Sun and B.T. Hsieh, “Remarks on two non-repudiable proxy signature schemes”, In Proceedings of the 9th National Conference on Information Security, pp.241–246, 1999. [18.] S.M. Yen, C.P. Hung, and Y.Y. Lee, “ Remark on Some Proxy Signature Scheme”, In Proceedings of the 2000 International Computer Symposium, workshop on Cryptology and Information Security, Chiayi, Taiwan, pp.54-60, December 2000. [19.] Zuowen Tan, Zhuojun Liu, and Chunming Tang, “Digital proxy blind signature schemes based on DLP and ECDLP”, MM Research Preprints, MMRC, AMSS, Academia, Sinica, Beijing (2002), NO.21, pp. 212-217, December 2002 [20.] Sunder Lal and Amit K Awasthi, “Proxy Blind Signature Scheme”, Cryptology ePrint Archive, Report 2003/072, April 2003. [21.] Sunder Lal and Amit K Awasthi, “Proxy Blind Signature Scheme”, Transaction On Cryptology, Volume 2- Issue 1, pp.5-11, January 2005. [22.] Shaobin Wang, Fan Hong, and Ghohua Gui, “Secure Efficient Proxy Blind Signature Schemes Based DLP”, Proceedings of the Seventh IEEE International Conference on E-Commerce Technology (CEC’05), pp. 452-455, July 2005. [23.] http://en.wikipedia.org/wiki/Man_in_the_middle_attack. [24.] Gritzalis, Dimitris A. “Principles and requirements for a secure e-voting system”. Computers and Security Volume: 21, Issue: 6, pp. 539-556, October 2002. [25.] Adi Shamir and Yael Tauman, “Improved online/offline signature schemes”, CRYPTO 2001, LNCS 2139, pp. 355-367, August 2001. [26.] D.Chaum and E. van Heyst, “Group Signature”, In Andances in Cryptology –EUROCRYPT’ 91, Vol. 547 of LNCS, pp. 257-265, pringer – Verlag, 1991
|