共 31 条
[1]
[Anonymous], 1991, INPROC 11 ANN INT CR, DOI [10.1007/3-540-46766-1_9, DOI 10.1007/3-540-46766-1_9, DOI 10.1007/3--540-46766-1_9]
[3]
Baron Joshua, 2015, Applied Cryptography and Network Security. 13th International Conference, ACNS 2015. RevisedSelected Papers: LNCS 9092, P23, DOI 10.1007/978-3-319-28166-7_2
[4]
BLAKLEY G, 1979, AFIPS 1979 NAT COMP, P313, DOI 10.1109/MARK.1979.8817296
[5]
Cachin C, 2008, . U.S. Patent, Patent No. [7, 389, 416, 7389416]
[6]
Capocelli R. M., 1993, Journal of Cryptology, V6, P157, DOI 10.1007/BF00198463
[8]
Feldman P., 1987, 28th Annual Symposium on Foundations of Computer Science (Cat. No.87CH2471-1), P427, DOI 10.1109/SFCS.1987.4
[9]
Feng B., 2015, IJ NETW SECUR, V17, P123
[10]
GROUP-ORIENTED (T,N) THRESHOLD DIGITAL SIGNATURE SCHEME AND DIGITAL MULTISIGNATURE
[J].
IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES,
1994, 141 (05)
:307-313