An ID-based (k, t, n) Threshold Group Signature Scheme
暂无分享,去创建一个
[1] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[2] Liu Hong-wei. Efficiency identity-based threshold group signature scheme , 2009 .
[3] Huang Min. Efficient Scheme of (t,n) Threshold Group Signature , 2011 .
[4] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[5] Yvo Desmedt,et al. Shared Generation of Authenticators and Signatures (Extended Abstract) , 1991, CRYPTO.
[6] A. Shamm. Identity-based cryptosystems and signature schemes , 1985 .
[7] H A Allard. NOTES ON SOME SALAMANDERS AND LIZARDS OF NORTH GEORGIA. , 1909, Science.
[8] Fagen Li,et al. ID-based Signcryption Scheme with (t, n) Shared Unsigncryption , 2006, Int. J. Netw. Secur..
[9] D E Salmon. THE DISCOVERY OF THE GERM OF SWINE-PLAGUE. , 1884, Science.
[10] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[11] Chin-Chen Chang,et al. A novel efficient (t, n) threshold proxy signature scheme , 2006, Inf. Sci..