共 50 条
- [32] A novel efficient (t, n) threshold proxy signature scheme [J]. INFORMATION SCIENCES, 2006, 176 (10) : 1338 - 1349
- [33] Improvement of WPL's (T, N) threshold signature scheme [J]. ICCC2004: PROCEEDINGS OF THE 16TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION VOL 1AND 2, 2004, : 1032 - 1035
- [34] AN EFFICIENT AND SECURE (t, n) THRESHOLD SECRET SHARING SCHEME [J]. Journal of Electronics, 2006, (05) : 731 - 735
- [36] Cryptanalysis and improvement of a (t, n) threshold group signature scheme [J]. Quantum Information Processing, 2022, 21
- [37] A (t, n) threshold signature scheme against conspiracy attack [J]. 2006 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-4, 2006, : 1218 - 1221
- [38] Improvement of authenticated encryption scheme with (t, n) shared verification [J]. 24TH ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COSPSAC 2000), 2000, 24 : 445 - 448
- [39] A Secure Proxy Verifiably Encrypted Signature Scheme [J]. 2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 15 - 19
- [40] A Secure and Efficient Threshold Group Signature Scheme [J]. PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON APPLIED MECHANICS, MECHATRONICS AND INTELLIGENT SYSTEMS (AMMIS2015), 2016, : 567 - 573