共 50 条
- [2] Robust non-interactive t-out-of-n oblivious transfer based on the RSA cryptosystem [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2007, 10 (01): : 93 - 109
- [3] A t-out-of-n Redactable Signature Scheme [J]. CRYPTOLOGY AND NETWORK SECURITY (CANS 2019), 2019, 11829 : 470 - 489
- [5] Non-interactive t-out-of-n oblivious transfer based on the RSA cryptosystem [J]. 2007 THIRD INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, VOL II, PROCEEDINGS, 2007, : 45 - 48
- [6] An Improved (t,n) Threshold Proxy Signature Scheme Based on RSA Cryptosystem [J]. 2009 ISECS INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT, VOL IV, 2009, : 567 - 570
- [8] A modified (t, n) threshold proxy signature scheme based on the RSA cryptosystem [J]. THIRD INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND APPLICATIONS, VOL 2, PROCEEDINGS, 2005, : 576 - 579
- [9] A efficient (t,n) threshold proxy signature scheme based on elliptic curve cryptosystems [J]. 2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4586 - +
- [10] A provably secure t-out-of-n oblivious transfer mechanism based on blind signature [J]. Journal of Information Hiding and Multimedia Signal Processing, 2014, 5 (01): : 1 - 12