Cited by 19
Cryptanalysis of Nonrepudiable Threshold Proxy Signature Schemes with Known Signers

An ECDLP-Based Threshold Proxy Signature Scheme Using Self-Certified Public Key System
Qingshui Xue, Fengying Li, Yuan Zhou, Jiping Zhang, Zhenfu Cao, Haifeng Qian
Book:  Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (Security and Privacy in Mobile Information and Communication Systems) Volume 17 (2009), p. 58
2009 Fourth International Conference on Communications and Networking in China
Fengying Li, Jiping Zhang, Qingshui Xue, Zhenfu Cao
Conference:  (2009), p. 1
IEEE Conference on Cybernetics and Intelligent Systems, 2004.
Qingshui Xue, Zhenfu Cao
Conference:  (2004), p. 1386
The Fourth International Conference onComputer and Information Technology, 2004. CIT '04.
Qingshui, Zhenfu Cao
Conference:  (2004), p. 450
Two Improved Proxy Multi-signature Schemes Based on the Elliptic Curve Cryptosystem
Fengying Li, Qingshui Xue
Book:  Communications in Computer and Information Science (Computing and Intelligent Systems) Volume 234 (2011), p. 101
Analysis on a Non-repudiable Threshold Proxy Signature Scheme with Known Signers
Gang Li, Yanling Li, Chuanda Qi
Book:  Lecture Notes in Computer Science (Advances in Neural Networks – ISNN 2009) Volume 5552 (2009), p. 904
Fourth International Conference on Information Technology (ITNG'07)
Fengying Li, Qingshui Xue, Zhenfu Cao
Conference:  (2007), p. 815
A Threshold Proxy Signature Scheme Using Self-Certified Public Keys
Qingshui Xue, Zhenfu Cao
Book:  Lecture Notes in Computer Science (Parallel and Distributed Processing and Applications) Volume 3358 (2004), p. 715
Multi-proxy Multi-signature Binding Positioning Protocol
Huafeng Chen, Qingshui Xue, Fengying Li, Huajun Zhang, Zhenfu Cao, Jianwen Hou
Book:  Lecture Notes in Computer Science (Wireless Algorithms, Systems, and Applications) Volume 9204 (2015), p. 9
2010 International Conference on Computer Application and System Modeling (ICCASM 2010)
Qingshui Xue, Zhenfu Cao, Fengying Li
Conference:  (2010), p. V9-422
A Model of Bilinear-Pairings Based Designated-Verifier Proxy Signatue Scheme
Fengying Li, Qingshui Xue, Jiping Zhang, Zhenfu Cao
Book:  Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (Collaborative Computing: Networking, Applications and Worksharing) Volume 10 (2009), p. 416
A Proxy Signature Based on the Difficulty of Solving Equations of Higher on Quaternion Ring
Hui Shao, Fan Zhang, Xiao Zhuan Yuan, Chuan Da Qi
Journal:  Applied Mechanics and Materials Volume 513-517 (2014), p. 1951
A survey on lattice-based digital signature
Fengxia Liu, Zhiyong Zheng, Zixian Gong, Kun Tian, Yi Zhang, Zhe Hu, Jia Li, Qun Xu
Journal:  Cybersecurity Volume 7, Issue 1 (2024)
Analysis on the generalization of proxy signature
Namita Tiwari, Sahadeo Padhye
Journal:  Security and Communication Networks Volume 6, Issue 5 (2013), p. 549
Improvement of Tzeng et al.’s nonrepudiable threshold proxy signature scheme with known signers
Qi Xie
Journal:  Applied Mathematics and Computation Volume 168, Issue 2 (2005), p. 776
Improvement of nonrepudiable threshold multi-proxy threshold multi-signature scheme with shared verification
Qi Xie, Jilin Wang, Xiuyuan Yu
Journal:  Journal of Electronics (China) Volume 24, Issue 6 (2007), p. 806
Improvement on Hwang et al.’s generalization of proxy signature schemes based on elliptic curves
Shin-Jia Hwang, Chia-Wei Huang
Journal:  Applied Mathematics and Computation Volume 170, Issue 2 (2005), p. 941
Improvement on Li et al.'s generalization of proxy signature schemes
Shin-Jia Hwang, Ching-Chung Chan
Journal:  Computers & Security Volume 23, Issue 7 (2004), p. 615
Multi-proxy multi-signature binding positioning protocol
Qingshui Xue, Fengying Li, Huafeng Chen, Huajun Zhang, Zhenfu Cao
Journal:  Security and Communication Networks Volume 9, Issue 16 (2016), p. 3868