1 |
C. Li, T. Hwang and N. Lee, 'Remark on the threshold RSA signature scheme,' Advances in Cryptology-CRYPTO'93, Lecture Notes in Computer Science, Vol.773, pp.413-420, 1994
DOI
ScienceOn
|
2 |
E. Bresson, J. Stern, and M. Szydlo, 'Threshold ring signatures and applications to ad hoc groups,' http://www.di.ens.fr/~bresson/
|
3 |
M. Noar, 'Deniable ring authentication,' Advances of Cryptology-CRYPTO 2002, volume 2442 of Lecture Notes in Computer Science, Springer-Verlag, pp.481-498, 2002
|
4 |
R.L.Livest, A. Shamir and L. M. Adleman, 'A method for obtaining digital signatures and public key cryptosystems,' Communications of the ACM, Vol.21, No.2, pp.120-126, 1978
DOI
ScienceOn
|
5 |
National Institute of Standards and Technology(NIST), 'The digital signature standard, proposal and discussion,' Communications of the ACM, Vol.35, No.7, pp.36-34, 1992
DOI
|
6 |
L. Harn, 'Group oriented(t,n) threshold digital signature scheme and digital multisignature,' in IEE Proceedings of Computer and Digital Techniques, Vol.141, No.5, pp.307-313, 1994
DOI
ScienceOn
|
7 |
Y. Desmedt and Y. Frankel, 'Shared generation of authentication and signatures,' Advances in Cryptology-CRYPTO'91, pp.457-469, 1991
|
8 |
C. Li, T. Hwang and N. Lee, 'Threshold-multisignature schemes where suspected forgery implies traceability of adversarial shareholders,' Advances in Cryptology Proceedings of EUROCRYPT'94, pp.413-419, 1994
|
9 |
T. Hardjono and Y. Zheng, 'A practical digital multisignature scheme based on discrete logarithm,' Advances in Cryptology-Proceedings of Asiacrypto'92, pp.16-21, 1993
|
10 |
L. Ham and T. Kiesler, 'New scheme for digital multisignatures,' Electronics Letters, Vol.25, No.15, pp.1002-1003, 1989
DOI
ScienceOn
|
11 |
A. Shamir, 'How to share a secret,' Communications of the ACM, Vol.22, No.11, pp.612-613, 1979
DOI
ScienceOn
|
12 |
Wei-Bin Lee and Chin-Chen Chang, '(t,n) Threshold Digital Signature with Traceability Property,' Journal of Information Science and Engineering 15, pp.669-678, 1999
|
13 |
R. Rivest, A. Shamir, and Y. Tauman, 'How to leak a secret,' In Asiacypt'01, LNCS 2248, pp.552-565
|
14 |
E. Bresson, J. Stern, and M. Szydlo, 'Threshold ring signatures and applications to ad-hoc groups,' Advances of Cryptology-¬CRYPTO 2002, volume 2442 of Lecture Notes in Computer Science, Springer-Verlag, pp.465-480, 2002
|
15 |
M. Abe, M. Ohkubo, and K. Suzuki, '1-out of-n signatures from a variety of keys,' Advances of Cryptology-ASIACRYPT 2002, volume 2501 of Lecture Notes in Computer Science, Springer-Verlag, pp.415-432, 2002
|
16 |
J. Herranz and G. Saez, 'Forking lemmas in the ring signatures' scenario,' Cryptology ePrint Archive, April 2003
|