Cited by 9
Identity-Based Threshold Proxy Signature from Bilinear Pairings

2012 International Conference on Information Security and Intelligent Control
Yingying Qiao, Xiaonan Jiang, Hao Wen Lin, Jeng-Shyang Pan
Conference  (2012), p. 53
2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications
Minghui Zheng, Yongquan Cui, Liang Chen
Conference  (2013), p. 683
A Traceable Certificateless Threshold Proxy Signature Scheme from Bilinear Pairings
Tao Yang, Hu Xiong, Jianbin Hu, Yonggang Wang, Yong Deng, Biao Xiao, Zhong Chen
Book  Lecture Notes in Computer Science (Web Technologies and Applications) Volume 6612 (2011), p. 376
Auditable Anonymous Electronic Examination
Ádám Vécsi, Attila Pethő
Journal  Cryptography Volume 8, Issue 2 (2024), p. 19
Compact Genetic Algorithms using belief vectors
Joon-Yong Lee, Min-Soeng Kim, Ju-Jang Lee
Journal  Applied Soft Computing Volume 11, Issue 4 (2011), p. 3385
Design of ECSEPP: Elliptic Curve Based Secure E-cash Payment Protocol
Aditya Bhattacharyya, S. K. Setua
Book  Smart Innovation, Systems and Technologies (Proceedings of 3rd International Conference on Advanced Computing, Networking and Informatics) Volume 44 (2016), p. 337
Secure proxy signature schemes from the Weil pairing
Bing-Chang Chen, Her-Tyan Yeh
Journal  The Journal of Supercomputing Volume 65, Issue 2 (2013), p. 496
Security Vulnerability in Identity-Based Public Key Cryptosystems from Pairings
Jyh-Haw Yeh
Journal  International Journal of Information and Education Technology (2013), p. 466
k-time Proxy Signature: Formal Definition and Efficient Construction
Weiwei Liu, Guomin Yang, Yi Mu, Jiannan Wei
Book  Lecture Notes in Computer Science (Provable Security) Volume 8209 (2013), p. 154