Secure(t,n) shared signature scheme

被引:0
|
作者
Shi, Ronghua
Hu, Xiangling
机构
来源
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:65 / 68
相关论文
共 50 条
  • [1] Secure(t,n) shared signature scheme
    [J]. 2000, Sci Publ House (22):
  • [2] Secure (T,N) threshold signature scheme
    Wang, Bin
    Pan, Hao-Dong
    Li, Jian-Hua
    [J]. Shanghai Jiaotong Daxue Xuebao/Journal of Shanghai Jiaotong University, 2002, 36 (09): : 1333 - 1336
  • [3] (t,n) threshold shared verification signature scheme based on discrete logarithms
    Shi, Ronghua
    [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2000, 37 (03): : 319 - 323
  • [4] A SIGNATURE WITH SHARED VERIFICATION SCHEME
    DESOETE, M
    QUISQUATER, JJ
    VEDDER, K
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1990, 435 : 253 - 262
  • [5] Secure group signature scheme
    Shi, Ronghua
    Hu, Xiangling
    [J]. Guofang Keji Daxue Xuebao/Journal of National University of Defense Technology, 2000, 22 (02): : 74 - 77
  • [6] An Advanced Secure (t, n) Threshold Proxy Signature Scheme Based on RSA Cryptosystem for Known Signers
    Kumar, Raman
    Verma, Harsh Kumar
    [J]. 2010 IEEE 2ND INTERNATIONAL ADVANCE COMPUTING CONFERENCE, 2010, : 293 - 298
  • [7] A New Proxy Signature Scheme As Secure As ElGamal Signature
    Han, Song
    Chang, Elizabeth
    Wang, Jie
    Liu, Wanquan
    [J]. PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 6, 2005, : 286 - 290
  • [8] A forward secure ring signature scheme
    Bao Wansu
    Wei Yun
    [J]. 2008 FOURTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PROCEEDINGS, 2008, : 215 - 218
  • [9] A New Signature Scheme with Shared Verification
    JIA Xiao-yun 1
    2.School of Software Engineering
    3.National Key Laboratory of Integrated Service Networks
    [J]. The Journal of China Universities of Posts and Telecommunications, 2006, (02) : 66 - 69
  • [10] A secure Certificateless Aggregate Signature Scheme
    Kang, Baoyuan
    Xu, Danhui
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (03): : 55 - 67