Voir la notice de l'article provenant de la source Math-Net.Ru
@article{PDM_2011_1_a4, author = {E. A. Tolyupa}, title = {Some proxy signature protocols}, journal = {Prikladna\^a diskretna\^a matematika}, pages = {70--77}, publisher = {mathdoc}, number = {1}, year = {2011}, language = {ru}, url = {http://geodesic.mathdoc.fr/item/PDM_2011_1_a4/} }
E. A. Tolyupa. Some proxy signature protocols. Prikladnaâ diskretnaâ matematika, no. 1 (2011), pp. 70-77. http://geodesic.mathdoc.fr/item/PDM_2011_1_a4/
[1] Mambo M., Usuda K., Okamoto E., “Proxy signatures: Delegation of the power to sign messages”, IEICE Trans. Fundamentals, E79-A:9 (1996), 1338–1353
[2] Mambo M., Usuda K., Okamoto E., “Proxy signatures for delegating signing operation”, Proc. of 3rd ACM Conference on Computer and Communications Security, CCS' 96, ACM Press, 1996, 48–57
[3] Kim S., Park S., Won D, “Proxy signatures, revisited”, Information and Communications Security, ICICS' 97, LNCS, 1334, 1997, 223–232 | Zbl
[4] Lee B., Kim H., Kim K., “Strong proxy signature and its applications”, Proc. of the 2001 Symposium on Cryptography and Information Security, SCIS' 01 (Oiso, Japan, Jan. 23–26, 2001), V. 2/2, 603–608 | Zbl
[5] Lee J.-Y., Cheon J.-H., Kim S., “An analysis of proxy signatures: Is a secure channel necessary?”, LNCS, 2612, 2003, 68–79 | MR | Zbl
[6] Wang G., Bao F., Zhou J., Deng R. H., “Security Analysis of Some Proxy Signatures”, LNCS, 2971, 2004, 305–319 | MR | Zbl