共 50 条
- [1] Cryptanalysis of threshold proxy signature scheme based on factoring [J]. ISISE 2008: INTERNATIONAL SYMPOSIUM ON INFORMATION SCIENCE AND ENGINEERING, VOL 1, 2008, : 473 - +
- [2] A (k, n) threshold nominative proxy signature scheme for electronic commerce [J]. Journal of China University of Mining and Technology, 2006, 16 (04): : 470 - 474
- [4] An efficient proxy-protected signature scheme based on factoring [J]. PARALLEL AND DISTRIBUTED PROCESSING AND APPLICATIONS - ISPA 2005 WORKSHOPS, 2005, 3759 : 332 - 341
- [5] A New Threshold Signature Scheme Based on ECC and Factoring [J]. 2009 ISECS INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT, VOL IV, 2009, : 550 - +
- [6] Threshold Signature Scheme Based on Factoring and Discrete Logarithms [J]. INTERNATIONAL CONFERENCE ON FUNDAMENTAL AND APPLIED SCIENCES 2012 (ICFAS2012), 2012, 1482 : 460 - 463
- [9] Proxy signature schemes based on factoring [J]. INFORMATION PROCESSING LETTERS, 2003, 85 (03) : 137 - 143
- [10] A modified (t, n) threshold proxy signature scheme based on the RSA cryptosystem [J]. THIRD INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND APPLICATIONS, VOL 2, PROCEEDINGS, 2005, : 576 - 579