共 50 条
- [42] Efficient, XOR-Based, Ideal (t,n) - threshold Schemes CRYPTOLOGY AND NETWORK SECURITY, CANS 2016, 2016, 10052 : 467 - 483
- [43] Research on Image Information Hiding Method Based On (T,N) Threshold 2012 INTERNATIONAL CONFERENCE ON INDUSTRIAL CONTROL AND ELECTRONICS ENGINEERING (ICICEE), 2012, : 1158 - 1161
- [44] An efficient (t, n) threshold quantum secret sharing without entanglement MODERN PHYSICS LETTERS B, 2016, 30 (12):
- [46] The Insecurity of a Certificateless Undeniable Signature Scheme 2016 INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2016, : 582 - 587
- [47] How to Aggregate the CL Signature Scheme COMPUTER SECURITY - ESORICS 2011, 2011, 6879 : 298 - 314
- [48] Digital Signature Scheme over Lattices 25TH INTERNATIONAL CONFERENCE ON CIRCUITS, SYSTEMS, COMMUNICATIONS AND COMPUTERS (CSCC 2021), 2021, : 71 - 78
- [50] Robust T-out-of-N proxy signature based on RSA cryptosystems INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2008, 4 (02): : 425 - 431