Cited by 13
Improved Non‐Repudiable Threshold Proxy Signature Scheme with Known Signers

An ECDLP-Based Threshold Proxy Signature Scheme Using Self-Certified Public Key System
Qingshui Xue, Fengying Li, Yuan Zhou, Jiping Zhang, Zhenfu Cao, Haifeng Qian
Book:  Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (Security and Privacy in Mobile Information and Communication Systems) Volume 17 (2009), p. 58
A Model of Bilinear-Pairings Based Designated-Verifier Proxy Signatue Scheme
Fengying Li, Qingshui Xue, Jiping Zhang, Zhenfu Cao
Book:  Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (Collaborative Computing: Networking, Applications and Worksharing) Volume 10 (2009), p. 416
2010 International Conference on Computer Application and System Modeling (ICCASM 2010)
Qingshui Xue, Zhenfu Cao, Fengying Li
Conference:  (2010), p. V9-422
Multi-proxy Multi-signature Binding Positioning Protocol
Huafeng Chen, Qingshui Xue, Fengying Li, Huajun Zhang, Zhenfu Cao, Jianwen Hou
Book:  Lecture Notes in Computer Science (Wireless Algorithms, Systems, and Applications) Volume 9204 (2015), p. 9
2009 Fourth International Conference on Communications and Networking in China
Fengying Li, Jiping Zhang, Qingshui Xue, Zhenfu Cao
Conference:  (2009), p. 1
A Threshold Proxy Signature Scheme Using Self-Certified Public Keys
Qingshui Xue, Zhenfu Cao
Book:  Lecture Notes in Computer Science (Parallel and Distributed Processing and Applications) Volume 3358 (2004), p. 715
Fourth International Conference on Information Technology (ITNG'07)
Fengying Li, Qingshui Xue, Zhenfu Cao
Conference:  (2007), p. 815
Cryptanalysis of Protocol for Enhanced Threshold Proxy Signature Scheme Based on Elliptic Curve Cryptography for Known Signers
Raman Kumar
Book:  (2018), p. 191
A New Nonrepudiable Threshold Proxy Signature Scheme with Valid Delegation Period
Min-Shiang Hwang, Shiang-Feng Tzeng, Chun-Ta Li
Book:  Lecture Notes in Computer Science (Computational Science and Its Applications – ICCSA 2007) Volume 4707 (2007), p. 273
Analysis and Design of Protocol for Enhanced Threshold Proxy Signature Scheme Based on RSA for Known Signers
Raman Kumar, Harsh Kumar Verma, Renu Dhir
Journal:  Wireless Personal Communications Volume 80, Issue 3 (2015), p. 1281
Comments on "A practical (t, n) threshold proxy signature scheme based on the RSA cryptosystem"
G. Wang, F. Bao, J. Zhou, R.H. Deng
Journal:  IEEE Transactions on Knowledge and Data Engineering Volume 16, Issue 10 (2004), p. 1309
Multi-proxy multi-signature binding positioning protocol
Qingshui Xue, Fengying Li, Huafeng Chen, Huajun Zhang, Zhenfu Cao
Journal:  Security and Communication Networks Volume 9, Issue 16 (2016), p. 3868
Visual secret sharing for multiple secrets
Jen-Bang Feng, Hsien-Chu Wu, Chwei-Shyong Tsai, Ya-Fen Chang, Yen-Ping Chu
Journal:  Pattern Recognition Volume 41, Issue 12 (2008), p. 3572