共 50 条
- [3] A New Identity-Based Threshold Ring Signature Scheme 2011 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC), 2011, : 2646 - 2651
- [5] Identity-based threshold proxy signature scheme with known signers THEORY AND APPLICATIONS OF MODELS OF COMPUTATION, PROCEEDINGS, 2006, 3959 : 538 - 546
- [6] An identity-based threshold ring signature scheme based on the bilinear pairings PROCEEDINGS OF THE FIRST INTERNATIONAL SYMPOSIUM ON DATA, PRIVACY, AND E-COMMERCE, 2007, : 233 - +
- [7] An Identity-Based Adaptor Signature Scheme and its Applications in the Blockchain System IEEE OPEN JOURNAL OF THE COMPUTER SOCIETY, 2023, 4 : 231 - 242
- [8] On the security of an identity-based threshold proxy signature scheme with known signers ICNC 2007: THIRD INTERNATIONAL CONFERENCE ON NATURAL COMPUTATION, VOL 3, PROCEEDINGS, 2007, : 210 - +
- [10] Identity-based Group User Data Integrity Verification Scheme Ruan Jian Xue Bao/Journal of Software, 2022, 33 (12): : 4758 - 4770