共 32 条
[1]
Araki S, 1999, IEICE T FUND ELECTR, VE82A, P63
[2]
Bao F., 1998, Public Key Cryptography. First International Workshop on Practice and Theory in Public Key Cryptography, PKC'98. Proceedings, P55, DOI 10.1007/BFb0054014
[3]
BENOR M, 1988, ADV CRYPTOLOGY, P21
[4]
Blum M., 1988, Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, P103, DOI 10.1145/62212.62222
[5]
Boneh D., 1998, Algorithmic Number Theory. Third International Symposium, ANTS-III. Proceedings, P48, DOI 10.1007/BFb0054851
[7]
A threshold signature scheme for group communications without a shared distribution center
[J].
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE,
2004, 20 (06)
:1013-1021
[8]
Chang TY, 2004, IEICE T FUND ELECTR, VE87A, P1645
[9]
DESMEDT Y, 1987, ADV CRYPTOLOGY CRYPT, P120