|
[1] D. M. Alghazzawi, T. M. Salim and S. H. Hasan, “ A new proxy blind signature scheme based on ECDLP,” IJCSI International Journal of Computer Science Issues, vol. 8, issue 3, no. 1, pp. 73-79, May 2011.
[2] D. Boneh and M. Franklin, “Identity-Based Encryption from the Weil Pairing,” In CRYPTO 2001, vol. 2139 of LNCS, pp. 213-229, 2001.
[3] D. Chaum, “Untraceable electronic mail, return addresses, and digital pseudonyms,” Communications of the ACM, vol.24, no.2, pp.84-88, 1981.
[4] D. Chaum, “Blind Signature for Untraceable Payments,” Advances in Cryptology, proceeding of CRYPTO’82, Springer-Verlag, pp.199-203, 1983.
[5] D. Chaum, “Blind Signature systems,” Advances in Cryptology, proceeding of CRYPTO’83, Springer-Verlag, pp.153-166, 1984.
[6] D. Chaum, A. Fiat and M. Naor, Untraceable electronic cash,” Proc. on Advances in Cryptology, Santa Barbara, CA, pp.319-327, 1990.
[7] C.C. Chang, C.Y. Lee, Y.C. Chiu,“Enhanced authentication scheme with anonymity for roaming service in global networks,” Computer Communications, vol. 32, no. 4, pp. 611-618, 2009.
[8] H. Y. Chien, J. K. Jan and Y. M. Tseng, “RSA-based partially blind signature with low computation,” Proc. of the 8th IEEE International Conference on Parallel and Distributed Systems, pp.385-389, 2001.
[9] G. Davida, Y. Frankel, Y. Tsiounis, M. Yung, “Anonymity control in E-cash systems,” Financial Cryptography Lecture Notes in Computer Science, vol 1318, pp 1-16, 1997.
[10] M. S. Hwang, C. C. Lee and Y. C. Lai, “An untraceable blind signature scheme,” IEICE Trans. Fundam Electron Commun. Comput. Sci. (Inst. Electron Inf. Commun. Eng.), vol.E86-A, no.7, pp.1902-1906, 2003.
[11] M. S. Hwang, I.C. Lin, E.J.L. Lu, “A secure nonrepudiable threshold proxy signature scheme with known signers,” International Journal of Informatica, vol 11, no. 2, pp.137-144, 2000
[12] J. Kar and B. Majhi, “A Novel Fair Tracing E-Cash System Based on Elliptic Curve Discrete Logarithm Problem Anonymity control in E-cash systems,” International Journal of Security and Its Applications, vol. 3, no. 4, October, pp. 9-24, 2009. [13] B. Kar, P. P. Sahoo and A. K. Das, “A Secure Proxy Blind Signature Scheme Based on DLP,” International Conference on Multimedia Information Networking and Security (MINES), pp. 477-480, 2010.
[14] S. Kim, S. Park, D. Won, “Proxy signatures,” in: Proc. of ICICS’97, LNCS 1334, pp. 223-232, 1997.
[15] S. Lal, and A. K. Awasthi, “Proxy Blind Signature Scheme,” Journal of Information Science and Engineering, pp.5-11, 2003.
[16] B. Lee, H. Kim, and K. Kim, “Strong proxy signature and its application,” Australasian Conference on Information Security and Privacy (ACISP’2001), LNCS 2119, Springer-Verlag, Sydney, pp.603-608, 2001.
[17] C. T. Li, “A more secure and efficient authentication scheme with roaming service and user anonymity for mobile communications,” Information technology and control, vol. 41, no. 1, pp. 69-76, 2012.
[18] W.D. Lin, and J.K. Jan, “A security personal learning tools using a proxy blind signature scheme,” Proc. of Intl Conference on Chinese Language Computing, pp.273-277, 2000.
[19] M. Mambo, K. Usuda, E. Okamoto, “Proxy signatures: delegation of the power to sign message,” IEICE Transactions on Fundamentals E79-A, pp. 1338-1353, 1996.
[20] E. Mohammed, A. E. Emarah and K. El-Shennawy, “A blind signature scheme based on ElGamal signature”, EUROCOMM 2000: Information Systems for Enhanced Public Safety and Security, pp.51-53, 2000.
[21] H. Mun, K. Han, Y. S. Lee , C. Y. Yeun, H. H. Choi, “Enhanced secure anonymous authentication scheme for roaming service in global mobility networks,” Mathematical and Computer Modelling, vol. 55, pp.214-222, 2012.
[22] C.Y. Ng, W, Susilo, Y. Mu, “Universal Designated Multi Verifier Signature Schemes,” Parallel and Distributed Systems, Proceedings. 11th International Conference ,vol. 2, pp 305-309, 2005.
[23] A.N. Oo, N. Thein, “DLP based Proxy Blind Signature Scheme with Low-Computation,” Fifth International Joint Conference on INC, IMS and IDC, pp.285-288, 2009.
[24] C. Popescu, “A Fair Off-line Electronic Cash System Based on Elliptic Curve Discrete Logarithm Problem,” Studies in Informatics and Control, vol 14, No. 4, pp.291-298, 2005.
[25] S. Pradhan and R. K. Mohapatra, “Proxy blind signature scheme based on ECDLP,” International Journal of Engineering Science &;Technology, vol. 3, issue 3, pp. 2244-2248, 2011.
[26] S. Srivastava and V. Saraswat, “E-Cash Payment Protocols,” International Journal on Computer Science and Engineering, vol. 4 no. 09, pp.1603-1607, 2012.
[27] R. Steinfeld, L. Bull, H. Wang, J. Pieprzyk, “Universal Designated-Verifier Signatures,” Advances in Cryptology, Lecture Notes in Computer Science, vol.2894, pp 523-542, 2003.
[28] Z. Tan, “An E-Cash Scheme Based on Proxy Blind Signature from Bilinear Pairings,” Journal of Computers, vol. 5 Issue 11, pp.1638-1645, 2010.
[29] Z. Tan, Z. Liu, and C. Tang, “Digital proxy blind signature schemes based on DLP and ECDLP,” MM Research Preprints, pp. 212-217, 2002.
[30] S. Verma, B. Kumar Sharma, “A New Proxy Blind Signature Scheme Based on DLP,” International Journal of Information &; Network Security (IJINS) Vol.1, No.2, pp. 60-66, 2012.
[31] H. Y. Wang and R. C. Wang, “A proxy blind signature scheme based on ECDLP,” Chinese Journal of Electronics, vol. 14, no. 2, pp. 281-284, 2005.
[32] C. C. Wu, W. B. Lee, and W. J. Tsaur, “A Secure Authentication Scheme with Anonymity for Wireless Communications,” IEEE Communications Letters, vol. 12, no. 10, pp. 722- 723, 2008.
[33] Q. Xue, Z. Cao, “Factoring based proxy signature schemes,” Journal of Computational and Applied Mathematics 195 (1–2) pp.229-241, 2006.
[34] X. Yang and Z. Yu, “Security Analysis of a proxy blind signature scheme based on ECDLP,” in Proc. 4th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM'08), Oct. 2008, pp. 1-4.
[35] X. Yang and Z. Yu, “An efficient proxy blind signature scheme based on DLP,” in the International Conference on Embedded Software and Systems (ICESS 2008), pp. 163-167, 2008.
[36] E. J. Yoon, K. Y. Yoo, and K. S. Ha, “A user friendly authentication scheme with anonymity for wireless communications,” Computers and Electrical Engineering, vol.37, no.3, pp.356-364, 2011.
[37] J. Zhu and J. Ma, Member, “A new authentication scheme with anonymity for wireless environments,” Consumer Electronics, IEEE Transactions on, vol. 50, no. 1, pp.231-235, 2004.
|