共 50 条
- [41] Security analysis of some threshold signature schemes and multi-signature schemes [J]. INFORMATION SECURITY AND CRYPTOLOGY, PROCEEDINGS, 2005, 3822 : 233 - 241
- [42] A Secure and Efficient Signature Scheme for IoT in Healthcare [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 73 (03): : 6151 - 6168
- [44] Secure signature schemes based on interactive protocols [J]. ADVANCES IN CRYPTOLOGY - CRYPTO '95, 1995, 963 : 297 - 310
- [45] Provable security of proxy signature schemes [J]. ICCC2004: PROCEEDINGS OF THE 16TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION VOL 1AND 2, 2004, : 1059 - 1063
- [46] Boosting the Security of Blind Signature Schemes [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2021, PT IV, 2021, 13093 : 468 - 492
- [48] The security of the birational permutation signature schemes [J]. JOURNAL OF CRYPTOLOGY, 1997, 10 (03) : 207 - 221
- [49] THE SECURITY OF HE AND KIESLERS SIGNATURE SCHEMES [J]. IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 1995, 142 (05): : 370 - 372
- [50] A Survey on Security of Certificateless Signature Schemes [J]. IETE TECHNICAL REVIEW, 2016, 33 (02) : 115 - 121