共 50 条
- [44] A secret sharing scheme based on (t, n) threshold and adversary structure [J]. International Journal of Information Security, 2009, 8
- [45] New Signcryption Scheme based on Multivariate Public-key Cryptosystem [J]. PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON MECHATRONICS, ELECTRONIC, INDUSTRIAL AND CONTROL ENGINEERING, 2015, 8 : 227 - 230
- [46] Secure (T,N) threshold signature scheme [J]. Shanghai Jiaotong Daxue Xuebao/Journal of Shanghai Jiaotong University, 2002, 36 (09): : 1333 - 1336
- [47] Cheater identification in (t,n) threshold scheme [J]. COMPUTER COMMUNICATIONS, 1999, 22 (08) : 762 - 765
- [48] Threshold signcryption scheme based on elliptic curve cryptosystem and verifiable secret sharing [J]. 2005 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING PROCEEDINGS, VOLS 1 AND 2, 2005, : 1136 - 1139
- [50] A new forward-secure threshold signature scheme based on Schnorr cryptosystem [J]. CIS: 2007 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PROCEEDINGS, 2007, : 599 - +