|
[1]M. Abe and E. Fujisaki: “How to Date Blind Signatures”, Proceeding of ASIACRYPT’96, LNCS 1163, pp. 244-251, 1996. [2]M. Abe and J. Camenisch: “Partially Blind signature Schemes”, Proceeding of the 1997 symposium on Cryptography and Information Security, SCIS97-33D, 1997. [3]S. Brands: “Untraceable Off-Line Cash in Wallet with Observers”, Proceeding of CRYPTO’93, pp. 302-318, 1993. [4]S. Brands: “Restrictive Binding of Secret-Key Certificates”, Proceeding of EUROCRYPT’95, LNCS 921, pp.231-247, 1995. [5]D. Chaum: “Blind Signatures for Untraceable Payments”, Proceeding of CRYPTO’82, Lecture Notes in Computer Science, Springer-Verlag Berlin, pp. 199-203, 1983. [6]D. Chaum, A. Fiat and M. Noar: “Untraceable Electronic Cash”, Proceeding of CRYPTO’88, Lecture Notes in Computer Science, pp. 319-327, 1988. [7]D. Chaum, B. D. Boer, E. V. Heyst, S. Mjflsnes and A. Steenbeek: “Efficient Offline Electronic Checks (Extended Abstract)”, Proceeding of EUROCRYPT’89, Lecture Notes in Computer Science, Springer-Verlag, pp. 294-301, 1989. [8]Carnegie Mellon University: “NetBill: 1994 Prototype”, Technical Report, Carnegie Mellon University Information Networking Institute, Number TR 1994-11, 1994. [9]S. J. Hwang and C. H. Shi: “Specifiable Proxy Signature Schemes”, Proceedings of the National Computer Symposium, pp. C-190-197, 1999. [10] S. J. Hwang and C. H. Shi: “A Simple Multi-Proxy Signature Scheme”, Proceedings of the Tenth National Conference on Information Security, pp. 134-138, 2000. [11] S. Kim, S. Park and D. Won: “Proxy Signatures, revisited”, ICICS’97, Lecture Notes in Computer Science 1334, Springer-Verlag, pp. 223-232, 1997. [12] W. B. Lee and C. Y. Chang: “Efficient Proxy-protected Proxy Signature Scheme Based on Discrete Logarithm”, Proceedings of the Tenth National Conference on Information Security, pp. 4-7, 2000. [13] M. Mambo, K. Usuda and E. Okamoto: “Proxy Signatures: Delegation of the Power to Sign Message”, IEICE Trans. Fundamentals, Vol. E79-A, NO. 9, Sep., pp.1338-1353, 1996. [14] M. Mambo, K. Usuda and E. Okamoto: “Proxy Signatures for Delegating Signing Operation”, Proceeding of 3rd ACM Conference on Computer and Communications Security, pp. 48-57, 1996. [15] S. Miyazaki, M. Abe and K. Sakurai: “Partially Blind Signature Schemes for the DSS and for a Discrete Log. Based Message Recovery Signature”, Proceeding of the 1997 Korea-Japan Joint Workshop on Information Security and Cryptology, pp. 217-226, 1997. [16] S. Miyaaki and K. Sakurai: “A More Efficient Untraceable E-Cash System with Partially Blind Signatures Based on the Discrete Logarithm Problem”, Proceeding of Financial Cryptography 98, pp. 296-308, 1998. [17] B. Clifford Neuman and G. Medvinsky: “Requirements for Network Payment: The NetChequeTM Perspective” [18] H. M. Sun and B. T. Hsieh: “Remarks on Two Nonrepudiable Proxy Signature Schemes”, Proceedings of the Ninth National Conference on Information Security, pp. 241-246, 1999. [19] H. M. Sun and B. J. Chen: “Time-Stamped Proxy Signatures with Traceable Receivers”, Proceedings of the Ninth National Conference on Information Security, pp. 247-253, 1999. [20] H. M. Sun, N. Y. Lee and T. L. Hwang: “Nonrepudiable Threshold Proxy Signatures”, Proceedings of the Ninth National Conference on Information Security, pp. 254-261, 1999. [21] H. M. Sun: “Convertible Proxy Signature Scheme”, Proceedings of the National Computer Symposium, pp. C-186-189, 1999. [22] Y. Yacobi: “Efficient Electronic Money”, Proceeding of ASIACRYPT’94, pp. 153-163, 1995. [23] K. Zhang: “Threshold Proxy Signature Schemes”, 1997 Information Security Workshop, Japan, Sep., pp. 191-197, 1997.
|