共 23 条
[1]
[Anonymous], 2012, 00032012 GMT STAT CR
[3]
DESMEDT Y, 1990, LECT NOTES COMPUT SC, V435, P307
[4]
Study on Secret Sharing for SM2 Digital Signature and Its Application
[J].
2018 14TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS),
2018,
:205-209
[5]
Fang XJ, 2017, 2017 3RD INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT (ICIM 2017), P412, DOI 10.1109/INFOMAN.2017.7950418
[7]
Gennaro R, 1996, LECT NOTES COMPUT SC, V1070, P354
[8]
Fully Homomorphic Encryption Using Ideal Lattices
[J].
STOC'09: PROCEEDINGS OF THE 2009 ACM SYMPOSIUM ON THEORY OF COMPUTING,
2009,
:169-178
[9]
Mahto Dindayal., 2018, INT J NETWORK SECURI, V20, P625
[10]
A new algorithm for a public key cryptosystem using elliptic curve
[J].
2017 EUROPEAN CONFERENCE ON ELECTRICAL ENGINEERING AND COMPUTER SCIENCE (EECS),
2017,
:17-22