Citation: | ZHANG Yingying and ZENG Jiwen, “An Efficient Proxy Ring Signature Without Bilinear Pairing,” Chinese Journal of Electronics, vol. 28, no. 3, pp. 514-520, 2019, doi: 10.1049/cje.2019.02.002 |
C.P. Schnorr, "Efficient signature generation by smart cards", Journal of cryptology, Vol.4, No.3, pp.161-174, 1991.
|
C.P. Schnorr, "Efficient identification and signatures for smart cards", Conference on the Theory and Application of Cryptology, Springer, New York, NY, pp.239-252, 1989.
|
T. ElGamal, "A public key cryptosystem and a signature scheme based on discrete logarithms", IEEE transactions on information theory, Vol.41, No.4, pp.469-472, 1985.
|
M. Mambo, K. Usuda and E. Okamoto, "Proxy signatures:delegation of the power to sign messages", IEICE transactions on fundamentals of electronics, communications and computer sciences, Vol.79, No.9, pp.1338-1354, 1996.
|
M. Mambo, K. Usuda and E. Okamoto, "Proxy signatures for delegating signing operation", Proceedings of the 3rd ACM conference on Computer and communications security, ACM, pp.48-57, 1996.
|
B. Lee, H. Kim and K. Kim, "Strong proxy signature and its applications", Proceedings of SCIS, pp. 603-608, 2001.
|
A.K. Awasthi and S. Lal, "ID-based ring signature and proxy ring signature schemes from bilinear pairings", arXiv preprint cs/0504097, 2005.
|
W. Wu, Y. Mu, W. Susilo, et al, "Identity-based proxy signature from pairings", Autonomic and Trusted Computing, Springer Berlin Heidelberg, pp.22-31, 2007.
|
A. Boldyreva, A. Palacio and B. Warinschi, "Secure proxy signature schemes for delegation of signing rights", Journal of Cryptology, Vol.25, No.1, pp.57-115, 2012.
|
M.S. Hwang, C.C. Lee and S.F. Tzeng, "A new proxy signature scheme for a specified group of verifiers", Information Sciences, Vol.227, pp.102-115, 2013.
|
J. Zhang and Y. Yu, "Short computational Diffie-Hellmanbased proxy signature scheme in the standard model", International Journal of Communication Systems, Vol.27, No.10, pp.1894-1907, 2014.
|
K. Zhang, "Threshold proxy signature schemes", International Workshop on Information Security, Springer, Berlin, Heidelberg, pp.282-290, 1997.
|
J. Liu and S. Huang, "Identity-based threshold proxy signature from bilinear pairings", Informatica, Vol.21, No.1, pp.41-56, 2010.
|
S. Lal and A.K. Awasthi, "Proxy blind signature scheme", Journal of Information Science and Engineering, Cryptology ePrint Archive, Report, Vol.72, 2003.
|
G.K. Verma, "A proxy blind signature scheme over braid groups", IJ Network Security, Vol.9, No.3, pp.214-217, 2009.
|
G. Fuchsbauer and D. Pointcheval, "Anonymous proxy signatures", International Conference on Security and Cryptography for Networks, Springer, Berlin, Heidelberg, pp.201-217, 2008.
|
K.A. Ajmath, P.V. Reddy, B.U. Rao, et al, "Identity-based directed proxy ring signature scheme", Journal of Discrete Mathematical Sciences and Cryptography, Vol.15, No.(2-3), pp.181-192, 2012.
|
D. Zhang, X. NIU and G. LI, "Secure and efficient anonymous proxy signature scheme in the random oracle model", The Journal of China Universities of Posts and Telecommunications, Vol.20, No.4, pp.87-92, 2013.
|
X. Li, K. Chen and L. Sun, "Certificateless signature and proxy signature schemes from bilinear pairings", Lithuanian Mathematical Journal, Vol.45, No.1, pp.76-83, 2005.
|
A. Boldyreva, A. Palacio and B. Warinschi, "Secure proxy signature schemes for delegation of signing rights", Journal of Cryptology, Vol.25, No.1, pp.57-115, 2012.
|
D. He, Y. Chen and J. Chen, "An efficient certificateless proxy signature scheme without pairing", Mathematical and Computer Modelling, Vol.57, No.9, pp.2510-2518, 2013.
|
C. Pan, S. Li, Q. Zhu, et al, "Notes on proxy signcryption and multi-proxy signature schemes", International Journal of Network Security, Vol.17, No.1, pp.29-33, 2015.
|
R.A. Sahu and S. Padhye, "Provable secure identity-based multi-proxy signature scheme", International Journal of Communication Systems, Vol.28, No.3, pp.497-512, 2015.
|
R.L. Rivest, A. Shamir and Y. Tauman, "How to leak a secret", International Conference on the Theory and Application of Cryptology and Information Security, Springer, Berlin, Heidelberg, pp.552-565, 2001.
|
K. Shum and V.K. Wei, "A strong proxy signature scheme with proxy signer privacy protection", International Workshops on Enabling Technologies:Infrastructure for Collaborative Enterprises (WETICE'02), pp.55-56, 2002.
|
N.Y. Lee and M.F. Lee, "The security of a strong proxy signature scheme with proxy signer privacy protection", Applied mathematics and computation, Vol.161, No.3, pp.807-812, 2005.
|
A. Yang and W. Peng, "A modified anonymous proxy signature with a trusted party", First International Workshop on Education Technology and Computer Science No.2, pp.233-236, 2009.
|
Y. Yu, C. Xu, X. Huang, et al, "An efficient anonymous proxy signature scheme with provable security", Computer Standards and Interfaces, Vol.31, No.2, pp.348-353, 2009.
|
J.S. Chou, "A novel anonymous proxy signature scheme", Advances in Multimedia, Vol.13, 2012.
|
Shamus Software Ltd., Miracl library. http://www.shamus.ie/index.php?page=home.
|
X. Cao and W. Kou, "A pairing-free identity-based authenticated key agreement scheme with minimal message", Information Sciences, Vol.180, No.15, pp.2895-2903, 2010.
|