Voir la notice de l'article provenant de la source Math-Net.Ru
@article{MAIS_2013_20_4_a3, author = {E. A. Tolyupa}, title = {An {Algorithm} of $(n,t)${-Threshold} {Proxy} {Signature} with an {Arbitrator}}, journal = {Modelirovanie i analiz informacionnyh sistem}, pages = {55--70}, publisher = {mathdoc}, volume = {20}, number = {4}, year = {2013}, language = {ru}, url = {http://geodesic.mathdoc.fr/item/MAIS_2013_20_4_a3/} }
E. A. Tolyupa. An Algorithm of $(n,t)$-Threshold Proxy Signature with an Arbitrator. Modelirovanie i analiz informacionnyh sistem, Tome 20 (2013) no. 4, pp. 55-70. http://geodesic.mathdoc.fr/item/MAIS_2013_20_4_a3/
[1] M. Mambo, K. Usuda, E. Okamoto, “Proxy signatures: Delegation of the power to sign messages”, IEICE Trans. Fundamentals, E79-A:9 (1996), 1338–1353
[2] M. Mambo, K. Usuda, E. Okamoto, “Proxy signatures for delegating signing operation”, Proc. of 3rd ACM Conference on Computer and Communications Security, CCS’96, ACM Press, 1996, 48–57
[3] S. Kim, S.Park, D. Won, “Proxy signatures, revisited”, Information and Communications Security (ICICS’97), LNCS, 1334, Springer-Verlag, 1997, 223–232 | Zbl
[4] B. Lee, H. Kim, K. Kim, “Strong proxy signature and its applications”, Proceedings of the 2001 Symposium on Cryptography and Information Security, SCIS’01 (Oiso, Japan, Jan. 23–26, 2001), v. 2/2, 603–608 | Zbl
[5] Kostrikin A. I., Vvedenie v algebru. Osnovy algebry, Uchebnik dlya vuzov, Fizmatlit, M., 1994 (in Russian) | Zbl
[6] T. Pedersen, “A Threshold Cryptosystem without a Trusted Party”, Eurocrypt 1991, LNCS, 547, Springer-Verlag, 1991, 522–526
[7] H. M. Sun, “An efficient nonrepudiable threshold proxy signatures with known signers”, Computer Communications, 22(8) (1999), 717–722 | DOI
[8] M.-S. Hwang, I.-C. Lin, K.-F. Lu, “A secure nonrepudiable threshold proxy signature scheme with known signers”, International Journal of Informatica, 11:2 (2000), 1–8
[9] C.-L. Hsu, T.-S. Wu, T.-C. Wu, “New nonrepudiable threshold proxy signature schemem with known signers”, The Journal of Systems and Software, 58 (2001), 119–124 | DOI
[10] C.-Y. Yang, S.-F. Tzeng, M.-S. Hwang, “On the efficiency of nonrepudiable threshold proxy signatures with known signers”, The Journal of Systems and Software, 22:9 (2003), 1–8
[11] S.-F. Tzeng, M.-S. Hwang, C.-Y. Yang, “An improvement of nonrepudiable threshold proxy signature schemem with known signers”, Computers Security, 23 (2004), 174–178 | DOI