共 50 条
- [2] A (t, n) threshold signature scheme against conspiracy attack [J]. 2006 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-4, 2006, : 1218 - 1221
- [3] Threshold signature scheme resistible for conspiracy attack [J]. SEVENTH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES, PROCEEDINGS, 2006, : 479 - +
- [4] An Efficient Threshold Signature Scheme Resistible to Conspiracy Attack [J]. APPLIED MATHEMATICS & INFORMATION SCIENCES, 2014, 8 (06): : 3027 - 3032
- [5] Multivariate Threshold Group Signature Scheme Withstanding Conspiracy Attack [J]. 2012 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT CONTROL, AUTOMATIC DETECTION AND HIGH-END EQUIPMENT (ICADE), 2012, : 114 - 118
- [8] A Verifiable (t, n) Threshold Quantum State Sharing Against Denial Attack [J]. IEEE ACCESS, 2019, 7 : 98908 - 98920
- [10] Publicly verifiable fully distributed proxy signature schemes [J]. Proceedings of 2005 Chinese Control and Decision Conference, Vols 1 and 2, 2005, : 1261 - 1264