共 50 条
- [2] A New Efficient Threshold Ring Signature Scheme Based on Coding Theory [J]. POST-QUANTUM CRYPTOGRAPHY, PROCEEDINGS, 2008, 5299 : 1 - 16
- [4] Security Analysis of a Paillier-based Threshold Proxy Signature Scheme [J]. 2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 683 - 687
- [5] Analysis and Improvement of a Threshold Signature Scheme Based on the General Access Structure [J]. CEIS 2011, 2011, 15
- [7] Partially Blind Signature Scheme Based on Threshold [J]. 2010 INTERNATIONAL CONFERENCE ON INFORMATION, ELECTRONIC AND COMPUTER SCIENCE, VOLS 1-3, 2010, : 512 - 516
- [8] A multivariate based threshold ring signature scheme [J]. Applicable Algebra in Engineering, Communication and Computing, 2013, 24 : 255 - 275
- [9] Threshold ring signature scheme based on the curve [J]. 2003 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY - PROCEEDINGS, 2003, : 139 - 139