|
[1]M. Steiner, G. Tsudik and M. Waidner, “Refinement and extension of encrypted key exchange,” ACM Operating Systems Review, Vol.29, pp. 22-30, 1995. [2]E. J. Yoon and K. Y. Yoo, “Improving the novel three-party encrypted key exchange protocol,” Computer Standard &; Interfaces , Vol. 30, pp. 309-314, 2008. [3]C. C. Chang and Y. F. Chang, “A novel three-party encrypted key exchange protocol,” Computer Standards &; Interfaces, Vol. 26, pp. 471-476, 2004. [4]W. Diffie and M. E. Hellman, “New directions in cryptography,” IEEE Transactions on Information Theory, Vol. 22, pp. 644-654, 1976. [5]S. M. Bellovin and M. Merrit, “Encrypted key exchange: password-based protocols secure against dictionary attacks,” in: IEEE Computer Society Symposium on Research in Security and Privacy, Oakland, California, pp. 72-84, 1992. [6]Y. Ding and P. Horster, “Undetectable on-line password guessing attacks,” ACM Operating Systems Review, Vol. 29, pp.77-86, 1995. [7]C. L. Lin, H. M. Sun and T. Hwang, “Three-party encrypted key exchange: attacks and a solution,” ACM Operating Systems Review, Vol. 34, pp. 12-20, 2000. [8]A. Shamir, “Identity-based cryptosystems and signature schemes,” Advances in Cryptology – Crypto’84, LNCS 196, Springer-Verlag, pp.47-53, 1984. [9]M. Mambo, K. Usuda and E. Okamoto, “Proxy signature: Delegation of the power to sign messages,” IEICE Transactions on Fundamentals, Vol. E79-A, No. 9, pp. 1338-1354, 1996. [10]S. Kim, S. Park and D. Won, “Proxy signatures, revisited,” Proceedings of the International Conference on Information and Communications Security, ICICS’97, LNCS 1334, pp. 223-232, 1997. [11]Y. F. Chang and C. C. Chang, “Efficient multi-proxy multi-signature schemes based on DLP,” International Journal of Computer Science and Network Security, Vol. 6, No. 2B, pp. 152-159, February 2006,. [12]Y. F. Chang and C. C. Chang, “An RSA-based (t,n) threshold proxy signature scheme with freewill identities,” International Journal of Information and Computer Security, Vol. 1, No. 1/2, pp. 201-209, 2007. [13]Y. F. Chang and C. C. Chang, “Robust t-out-of-n proxy signature based on RSA cryptosystems,” International Journal of Innovative Computing Information and Control, Vol. 4, No. 2, pp. 425-431, February 2008. [14]X. Hu and S. Huang, “A novel proxy key generation protocol and its application,” Computer Standards &; Interfaces, Vol. 29, No. 14, pp. 191-195, 2007. [15]D. Boneh and M. Franklin, “Identity based encryption from the Weil pairing,” Advances in Cryptology-Cryto’01, LNCS 2139, Springer-Verlag, pp. 213-229, 2001. [16]D. Boneh, B. Lynn and H. Shacham, “Short signatures from the Weil pairing,” Advances in Cryptology-Asiacryp’01, LNCS 2248, Springer-Verlag, pp. 514-532, 2001. [17]H. Park, S. Lim and I. Yie, “A privacy problem on Hu-Huang’s proxy key generation protocol,” Computer Standards &; Interfaces, Vol. 31, No. 17, pp. 480-483, 2009. [18]B. Lee, H. Kim and K. Won, “Secure mobile agent using strong non-designated proxy signature,” Proceedings of ACISP’01, LNCS 2119, Springer-Verlag, pp. 474-486, 2001. [19]F. Hess, “Efficient identity based signature schemes based on pairings,” Proceedings of SAC''02, LNCS 2595, Springer-Verlag, pp. 310-324, 2002. [20]J. C. Cha and J. H. Cheon, “An identity-based signature from gap Diffie–Hellman groups,” Proceedings of PKC''03, LNCS 2567, Springer-Verlag, pp. 18-30, 2003.
|