共 50 条
- [1] Threshold Cryptosystem and Its Application in Key Management Scheme [J]. KAM: 2008 INTERNATIONAL SYMPOSIUM ON KNOWLEDGE ACQUISITION AND MODELING, PROCEEDINGS, 2008, : 293 - 297
- [2] A threshold key escrow scheme based on public key cryptosystem [J]. Science in China Series E: Technological Sciences, 2001, 44 : 441 - 448
- [4] A threshold key escrow scheme based on public key cryptosystem [J]. SCIENCE IN CHINA SERIES E-TECHNOLOGICAL SCIENCES, 2001, 44 (04): : 441 - 448
- [5] An Improved (t,n) Threshold Proxy Signature Scheme Based on RSA Cryptosystem [J]. 2009 ISECS INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT, VOL IV, 2009, : 567 - 570
- [7] A modified (t, n) threshold proxy signature scheme based on the RSA cryptosystem [J]. THIRD INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND APPLICATIONS, VOL 2, PROCEEDINGS, 2005, : 576 - 579
- [9] A highly efficient threshold key escrow scheme based on elliptic curve cryptosystem [J]. 2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES: ITESS 2008, VOL 3, 2008, : 1177 - 1180
- [10] A Highly Efficient Threshold Key Escrow Scheme Based on Elliptic Curve Cryptosystem [J]. ITESS: 2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES, PT 2, 2008, : 527 - 532