|
[1] Dave Bayer, Stuart Haber, and W. Scott Stornetta. Improving the e±- ciency and reliability of digital time-stamping. In Sequences''91: Methods in Communication, Security, and Computer Science, pages 329{334, 1992. [2] Josh Benaloh and Michael de Mare. E±cient broadcast time-stamping. Technical Report 1, Clarkson University Department of Mathematics and Computer Science, 1991. [3] Ahto Buldas and Peeter Laud. New linking schemes for digital time- stamping. In Proceedings of the 1st International Conference on Informa- tion Security and Cryptology, pages 3{14, 1998. [4] Ahto Buldas, Peeter Laud, Helger Lipmaa, and Jan Villemson. Time- stamping with binary linking schemes. In CRYPTO''98, Lecture Notes in Computer Science 1462, pages 486{501, 1998. [5] Stuart Haber and W.-Scott Stornetta. Secure names for bit-strings. In Proceedings of the 4th ACM Conference on Computer and Communica- tions Security, pages 28{35, 1997. [6] M. S. Hwang, I. C. Lin, and Eric J. L. Lu. A secure nonrepudiable thresh- old proxy signature scheme with known signers. International Journal of Informatica, 11(2):1{8, 2000. [7] Seungjoo Kim, Sangjoo Park, and Dongho Won. Proxy signatures, revis- ited. In Proceedings of International Conference on Information and Com- munications Security, Lecture Notes in Computer Science 1334, pages 223{232, 1997. [8] Byoungcheon Lee, Heesun Kim, and Kwangjo Kim. Strong proxy sig- nature and its applications. In Proceedings of the 2001 Symposium on Cryptography and Information Security (SCIS 2001), 2001. [9] Masahiro Mambo, Keisuke Usuda, and Eiji Okamoto. Proxy signatures: Delegation of the power to sign messages. IEICE Transactions on Fun- damentals, E79-A(9):1338{1354, September 1996. [10] Masahiro Mambo, Keisuke Usuda, and Eiji Okamoto. Proxy signatures for delegating signing operation. In Proceedings of 3rd ACM conference on Computer and Communications Security, pages 48{57, 1996. [11] B. Cli®ord Neuman. Proxy-based authorization and accounting for dis- tributed systems. In Proceedings of the 13th International Conference on Distributed Computing Systems, pages 283{291, 1993. [12] T.P. Pedersen. A threshold cryptosystem without a trusted party. In Advances in Cryptology, CRYPTO''91, pages 522{526, 1991. [13] Bruce Schneier. Applied Cryptography. Wiley, New York, 1996. [14] Claus-Peter Schnorr. E±cient signature generation by smart cards. Jour- nal of Cryptology, 4:161{174, 1991. [15] Hung-Min Sun. Design of time-stamped proxy signatures with trace- able receivers. IEE Proceedings of Computers and Digital Techniques, 147(6):462{466, 2000. [16] Vijay Varadharajan, Phillip Allen, and Stewart Black. An analysis of the proxy problem in distributed systems. In Proceedings of 1991 IEEE Computer Society Symposium on Research in Security and Privacy, pages 255{275, 1991.
|