共 50 条
- [21] Provably secure authenticated key agreement scheme for distributed mobile cloud computing services [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2017, 68 : 74 - 88
- [23] A secure and efficient (t, n) threshold verifiable multi-secret sharing scheme [J]. COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 532 - 537
- [24] Provably Secure Server-Assisted Verification Threshold Proxy Re-signature Scheme [J]. TRUSTED COMPUTING AND INFORMATION SECURITY, CTCIS 2019, 2020, 1149 : 44 - 57
- [26] Secure(t,n) shared signature scheme [J]. Tiedao Xuebao/Journal of the China Railway Society, 2000, 22 (03): : 65 - 68
- [28] Asynchronous Distributed Key Generation for Computationally-Secure Randomness, Consensus, and Threshold Signatures [J]. CCS '20: PROCEEDINGS OF THE 2020 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2020, : 1751 - 1767
- [29] An Advanced Secure (t, n) Threshold Proxy Signature Scheme Based on RSA Cryptosystem for Known Signers [J]. 2010 IEEE 2ND INTERNATIONAL ADVANCE COMPUTING CONFERENCE, 2010, : 293 - 298
- [30] Cheater identification in (t,n) threshold scheme [J]. COMPUTER COMMUNICATIONS, 1999, 22 (08) : 762 - 765