共 50 条
- [1] Threshold signature scheme resistible for conspiracy attack [J]. SEVENTH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES, PROCEEDINGS, 2006, : 479 - +
- [3] An Efficient Threshold Signature Scheme Resistible to Conspiracy Attack [J]. APPLIED MATHEMATICS & INFORMATION SCIENCES, 2014, 8 (06): : 3027 - 3032
- [4] Verifiable threshold signature schemes against conspiracy attack [J]. Journal of Zhejiang University-SCIENCE A, 2004, 5 (1): : 50 - 54
- [5] Multivariate Threshold Group Signature Scheme Withstanding Conspiracy Attack [J]. 2012 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT CONTROL, AUTOMATIC DETECTION AND HIGH-END EQUIPMENT (ICADE), 2012, : 114 - 118
- [6] A (t, n) threshold signature scheme against conspiracy attack [J]. 2006 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-4, 2006, : 1218 - 1221
- [9] Media Exposure to Conspiracy vs. Anti-conspiracy Information. Effects on the Willingness to Accept a COVID-19 Vaccine [J]. CENTRAL EUROPEAN JOURNAL OF COMMUNICATION, 2021, 14 (02): : 237 - 258
- [10] Sub-signature verification protocol in threshold signature [J]. 2005, Shanghai Computer Society, Shanghai, China (31):