共 21 条
[1]
Assia BS, 2012, P 7 C NETW INF SYST
[2]
Budurushi Jurlind, 2013, 2013 International Conference on Availability, Reliability and Security (ARES), P198, DOI 10.1109/ARES.2013.27
[3]
Canetti R., 1999, Advances in Cryptology - CRYPTO'99. 19th Annual International Cryptology Conference. Proceedings, P98
[4]
CERECEDO M, 1993, IEICE T FUND ELECTR, VE76A, P532
[5]
Chaum D., 1993, Advances in Cryptology - CRYPTO '92. 12th Annual International Cryptology Conference Proceedings, P89
[6]
A secure and optimally efficient multi-authority election scheme
[J].
EUROPEAN TRANSACTIONS ON TELECOMMUNICATIONS,
1997, 8 (05)
:481-490
[7]
Feldman P., 1987, 28th Annual Symposium on Foundations of Computer Science (Cat. No.87CH2471-1), P427, DOI 10.1109/SFCS.1987.4
[8]
Fouque PA, 2001, LECT NOTES COMPUT SC, V1992, P300
[9]
A Distributed Approach of a Threshold Certificate-Based Encryption Scheme with No Trusted Entities
[J].
INFORMATION SECURITY JOURNAL,
2013, 22 (03)
:126-139
[10]
Gennaro R, 1999, LECT NOTES COMPUT SC, V1592, P295