共 12 条
[1]
Efficient cheater identification method for threshold schemes
[J].
IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES,
1997, 144 (01)
:23-27
[2]
Diffie W., 1992, Designs, Codes and Cryptography, V2, P107, DOI 10.1007/BF00124891
[7]
Just M., 1996, Advances in Cryptology - ASIACRYPT'96 International Conference on the Theory and Applications of Cryptology and Information Security. Proceedings, P36, DOI 10.1007/BFb0034833
[8]
Menezes A. J, 1997, HDB APPL CRYPTOGRAPH
[9]
Multiparty key agreement protocols
[J].
IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES,
2000, 147 (04)
:229-236