共 50 条
- [11] A modified and practical threshold proxy signature scheme based on RSA 9TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY: TOWARD NETWORK INNOVATION BEYOND EVOLUTION, VOLS 1-3, 2007, : 1958 - +
- [13] Digital Signature Scheme with a (t, l) Threshold Subliminal Channel Based on RSA Signature Scheme 2008 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, VOLS 1 AND 2, PROCEEDINGS, 2008, : 903 - +
- [14] A Simple Secure Signature Scheme Based on the Strong RSA Assumption without Random Oracle Model INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2007, 7 (11): : 159 - 162
- [16] A Lattice-Based Threshold Secret Sharing Scheme 2014 11TH INTERNATIONAL ISC CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2014, : 173 - 179
- [19] Verifiable reputation management scheme based on RSA threshold secret sharing in P2P networks Journal of Computational Information Systems, 2011, 7 (08): : 2770 - 2778
- [20] An efficient implementation of a threshold RSA signature scheme INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2005, 3574 : 382 - 393