共 50 条
- [1] Threshold signature scheme resistible for conspiracy attack [J]. SEVENTH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES, PROCEEDINGS, 2006, : 479 - +
- [2] A (t, n) threshold signature scheme against conspiracy attack [J]. 2006 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-4, 2006, : 1218 - 1221
- [3] Multivariate Threshold Group Signature Scheme Withstanding Conspiracy Attack [J]. 2012 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT CONTROL, AUTOMATIC DETECTION AND HIGH-END EQUIPMENT (ICADE), 2012, : 114 - 118
- [6] Verifiable threshold signature schemes against conspiracy attack [J]. Journal of Zhejiang University-SCIENCE A, 2004, 5 (1): : 50 - 54
- [7] An Efficient Threshold Signature Scheme [J]. 2011 SECOND ETP/IITA CONFERENCE ON TELECOMMUNICATION AND INFORMATION (TEIN 2011), VOL 1, 2011, : 85 - 87
- [10] An efficient threshold group signature scheme [J]. IMECS 2007: INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS, VOLS I AND II, 2007, : 338 - +