[1]HAO S G, LI Z, GHULAM M. A union authentication protocol of cross-domain based on bilinear pairing [J]. Journal of Software, 2013, 8(5): 1094-1100.
[2]ZHANG L, ZHANG J, XIA A, et al. Domain authentication protocol based on certificate signcryption in IPv6 network [C]// Proceedings of the International Conference on Information Engineering and Applications, LNCS 218. Berlin: Springer-Verlag, 2013: 213-220.
[3]HONG X, LONG Y. A novel unidirectional proxy re-signature scheme and its application for MANETs [J]. Journal of Computers, 2012, 7(7): 1796-1800.
[4]ATENIESE G, HOHENBERGER S. Proxy re-signatures: new definitions, algorithms, and applications [C]// Proceedings of the 12th ACM Conference on Computer and Communications Security. New York: ACM Press, 2005: 310-319.
[5]SHAO J, CAO Z, WANG L, et al. Proxy re-signature schemes without random oracles [C]// Proceedings of the 8th International Conference on Cryptology, LNCS 4859. Berlin: Springer-Verlag, 2007: 197-209.
[6]HU X, ZHANG Z, YANG Y. Identity based proxy re-signature schemes without random oracle [C]// Proceedings of the 2009 International Conference on Computational Intelligence and Security. Piscataway: IEEE Press, 2009: 256-259.
[7]YANG X, WANG C, ZHANG L, et al. On-line/off-line threshold proxy re-signatures [J]. Chinese Journal of Electronics, 2014, 23(2): 248-253.
[8]DENG Y, DU M, YOU Z, et al. A blind proxy re-signatures scheme based on standard model [J]. Journal of Electronics and Information Technology, 2010, 32(5): 1119-1223.
[9]HE D. A novel blind proxy re-signature scheme [J]. Computer Applications and Software, 2012, 29(3): 294-296.(贺得飞. 一种新的盲代理重签名方案[J].计算机应用与软件, 2012,29(3):294-296.)
[10]MENON T. An identity based proxy re-signature scheme[J]. IACSIT International Journal of Engineering and Technology, 2012, 4(3): 303-306.
[11]RAWAT S S, SHRIVASTAVA G K. Improved ID-based proxy re-signcryption scheme [C]// Proceedings of the 2012 IEEE CICN. Berlin: Springer-Verlag, 2012: 730-733.
[12]BUCHMANN J, DAHMEN E, ERETH S, et al. On the security of the Winternitz one-time signature scheme [J]. International Journal of Applied Cryptography, 2013, 3(1): 84-96.
[13]LIU Z, HU Y, ZHANG X. Efficient and strongly unforgeable short signature scheme in standard model [J]. Journal of Jiangsu University: Natural Science, 2013, 34(3): 309-313.(刘振华,胡予濮,张襄松.标准模型下高效的强不可伪造短签名方案[J].江苏大学学报:自然科学版,2013, 34(3):309-313.)
[14]WATERS B. Efficient identity-based encryption without random oracles [C]// Proceedings of the 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Berlin: Springer-Verlag, 2005: 114-127. |