1 |
Harn L, “Group-oriented (t,n) threshold digital signature scheme and digital multisignature,” IEE Proceedings-Computers and Digital Techniques, vol. 141, no. 5, pp. 307-313, September, 1994. Article (CrossRef Link).
DOI
|
2 |
BOYD C, "Digital multisignatures," in Proc. of Cryptography and Coding, pp. 241-246, December 17-21, 1986. Article (CrossRef Link).
|
3 |
Desmedt Y and Frankel Y, "Threshold cryptosystems," in Proc. of Advances in Cryptology, pp. 307-315, August 20-24, 1989. Article (CrossRef Link).
|
4 |
Desmedt Y and Frankel Y, "Shared generation of authenticators and signatures," in Proc. of Advances in Cryptology, pp. 457-469, August 11-15, 1991. Article (CrossRef Link).
|
5 |
Gennaro R, Jarecki S and Krawczyk H, "Robust threshold DSS signatures," in Proc. of Advances in Cryptology, pp. 354-371, May 12-16, 1996. Article (CrossRef Link).
|
6 |
Wang C T, Lin C H and Chang C C, “Threshold signature schemes with traceable signers in group communications,” Computer Communications, vol. 21, no. 8, pp. 771–776, June, 1998. Article (CrossRef Link).
DOI
|
7 |
Miyazaki K and Takaragi K, “A threshold digital signature scheme for a smart card based system,” IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol. 84, no. 1, pp. 205–213, January, 2001. Article (CrossRef Link).
|
8 |
Slim Bettaieb and Julien Schrek, "Improved lattice-based threshold ring signature scheme," Lecture Notes in Computer Science, vol. 7932, no. 1, pp. 34-51, June, 2013. Article (CrossRef Link).
|
9 |
HAN Jin-rong, LU Ji-qiang and WANG Xin- mei, “A verifiable threshold signature scheme based on the elliptic curve,” Journal of Xidian University, vol. 30, no. 1, pp. 26–28, February, 2003. Article (CrossRef Link).
|
10 |
Peng Hua-xi and Feng Deng-guo, “A forward secure threshold signature scheme from bilinear pairing,” Journal of Computer Research and Development, vol. 44, no. 4, pp. 574–580, April, 2007. Article (CrossRef Link).
DOI
|
11 |
SHEN Zhong-hua and YU Xiu-yuan, “Threshold signature scheme with threshold verification based on multivariate linear polynomial,” Journal of Shanghai Jiaotong University (Science), vol. 16, no. 5, pp. 551–556, October, 2011. Article (CrossRef Link).
DOI
|
12 |
Qingbin Wang, Shaozhen Chen and Aijun Ge, "A new lattice-based threshold attribute-based signature scheme," Lecture Notes in Computer Science, vol. 9065, no. 1, pp. 406-420, May, 2015. Article (CrossRef Link).
|
13 |
Fei Li, Wei Gao, Guilin Wang, Kefei Chen and Xueli Wang, “Efficient identity-based threshold signature scheme from bilinear pairings in standard model,” International Journal of Internet Protocol Technology, vol. 8, no. 2-3, pp. 107-115, January, 2014. Article (CrossRef Link).
DOI
|
14 |
Chinese Encryption Administration, "SM2 elliptic curve public key algorithms," December, 2010. Article (CrossRef Link).
|
15 |
Jung Yeon Hwang, Hyoung Joong Kim, Dong Hoon Lee and Boyeon Song, “An enhanced (t, n) threshold directed signature scheme,” Information Sciences, vol. 275, pp. 284-292, August, 2014. Article (CrossRef Link).
DOI
|
16 |
Raman Kumar, Harsh Kumar Verma and Renu Dhir, “Analysis and design of protocol for enhanced threshold proxy signature scheme based on RSA for known signers,” Wireless Personal Communications, vol. 80, no. 3, pp. 1281-1345, February, 2015. Article (CrossRef Link).
DOI
|