KOBLITZ N.Hyperelliptic cryptography[J].Journal of Cryptology,1989,1(3):139-150.
[2]
TAN Z,LIU Z,TANG C.A proxy blind signature scheme based on DLP[J].Journal of Software,2003,14(11):1931-1935.
[3]
ZHANG F G,ZHANG F T,WANG Y M.Selection of secure hyperelliptic curves ofg=2 based on a subfield[J].Journal ofComputer Science and Technology,2002,17(6):836-842.
[4]
LANGE T.Formulae for arithmetic on genus 2 hyperelliptic curves[J].Applicable Algebra in Engineering,Communicationsand Computing,2005,15(5):295-328.
蔡永泉,王亚丽.基于椭圆曲线的会议密钥协商协议[J].北京工业大学学报,2007,33(8):870-873.CAI Yong-quan,WANG Ya-li.Conference key agreement protocol based on elliptic curve[J].Journal of Beijing Universityof Technology,2007,33(8):870-873.(in Chinese)
[7]
白国强,黄谆,陈弘毅,等.基于椭圆曲线的代理数字签名[J].电子学报,2003,31(11):1659-1663.BAI Guo-qiang,HUANG Chun,CHEN Hong-yi,et al.Proxy digital signature based on elliptic curve[J].Acta ElectronicaSinica,2003,31(11):1659-1663.(in Chinese)
[8]
LU R X,CAO Z F,ZHOU Y.Proxy blind multi-signature scheme without a secure channel[J].Applied Mathematics andComputation,2005,16(1):179-187.
[9]
伊丽江,白国强,肖国镇.代理多重签名[J].计算机研究与发展,2001,38(2):204-206.YI Li-jiang,BAI Guo-qiang,XIAO Guo-zhen.Proxy multi signature[J].Journal of Computer Research and Development,2001,38(2):204-206.(in Chinese)