共 50 条
- [3] Non-interactive SM2 threshold signature scheme with identifiable abort [J]. Frontiers of Computer Science, 2024, 18
- [4] A General Threshold Signature Scheme Based on Elliptic Curve [J]. PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION APPLICATIONS (ICCIA 2012), 2012, : 89 - 92
- [6] Continual leakage resilient SM2 signature scheme [J]. PROCEEDINGS OF 2020 3RD INTERNATIONAL CONFERENCE ON UNMANNED SYSTEMS (ICUS), 2020, : 931 - 936
- [7] Adaptor Signature Scheme Based on the SM2 Digital Signature Algorithm [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2021, 58 (10): : 2278 - 2286
- [8] A NEW VERIFIABLE THRESHOLD DECRYPTION SCHEME WITHOUT TRUSTED CENTER [J]. INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2011, 17 (05): : 551 - 558
- [9] A novel ElGamal type threshold signature scheme without a trusted party [J]. WCICA 2006: SIXTH WORLD CONGRESS ON INTELLIGENT CONTROL AND AUTOMATION, VOLS 1-12, CONFERENCE PROCEEDINGS, 2006, : 3119 - +