共 50 条
- [21] An Improved (t,n) Threshold Proxy Signature Scheme Based on RSA Cryptosystem 2009 ISECS INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT, VOL IV, 2009, : 567 - 570
- [23] A practical solution to the (t, n) threshold untraceable signature with (k, l) verification scheme UBIQUITOUS INTELLIGENCE AND COMPUTING, PROCEEDINGS, 2006, 4159 : 998 - 1007
- [24] An efficient group-oriented (t,n) threshold signature scheme with message linkage 2001, Chinese Institute of Engineers (24):
- [25] A efficient (t,n) threshold proxy signature scheme based on elliptic curve cryptosystems 2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4586 - +
- [27] A group-oriented (t, n) threshold signature scheme against replay attacks UBIQUITOUS INTELLIGENCE AND COMPUTING, PROCEEDINGS, 2006, 4159 : 816 - 825
- [28] AN IMPROVED (t, n) THRESHOLD PROXY SIGNATURE SCHEME WITH FAULT TOLERANCE BASED ON RSA INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2010, 6 (07): : 3205 - 3218
- [29] Scheme for (T, N) threshold ID-based signature without a trusted dealer 2007 INTERNATIONAL CONFERENCE ON WAVELET ANALYSIS AND PATTERN RECOGNITION, VOLS 1-4, PROCEEDINGS, 2007, : 1341 - 1345