[1] |
DIFFIE W , HELLMAN M E . New directions in cryptography[J]. IEEE Transactions on Information Theory, 1976,22 (6):644-654.
|
[2] |
ITAKURA K . A public-key cryptosystem suitable for digital multi-signatures[J]. Nec Research & Development, 1983,71 (1):474-480.
|
[3] |
LU L R , ZENG J J , KUANG Y H , et al. A new multi-signature scheme based on discrete logarithm problem and its distributed computation[J]. Chinese Journal of Computers, 2002,25 (12):1417-1420.
|
[4] |
BURMESTER M , DESMEDT Y ' DOI H , et al. A structured elga-mal-type multi-signature scheme[C]// The 3rd International Work-shop on Practice and Theory in Public Key Cryptography.c 2000:466-483.
|
[5] |
DíAZ R D , ENCINAS L H , MASQUé J M . A multi-signature scheme based on the SDLP and on the IFP[C]// International Con-ference on Computational Intelligence in Security for Information Systems.c 2011:135-142.
|
[6] |
ZHANG J H , WEI Y Z , WANG Y M . Digital multi-signatures scheme based on RSA[J]. Journal of China Institute of Communi-cations, 2003,24 (8):150-154.
|
[7] |
U.S.Department of Commerce.Secure Hash standard-SHS:federal information processing standards publication 180-4[M]. Create Space Independent Publishing Platform, 2012.
|
[8] |
NOROOZI E , DAND S M , SABOUHI A , et al. A new dynamic hash algorithm in digital signature[J]. Advanced Machine Learning Technologies and Applications, 2012,322 (12):583-589.
|
[9] |
GUO W , ZHANG J Z , LI Y P , et al. Multi-proxy strong blind quan-tum signature scheme[J]. International Journal of Theoretical Phys-ics, 2016,55 (3):1-13.
|
[10] |
LI F ' XUE Q . Two improved proxy multi-sigvcdnature schemes based on the elliptic curve cryptosystem[M]// Computing and Intel-ligent Systems. Berlin Heidelberg: Springer, 2011:101-109.
|
[11] |
CHOUKSEY R , SIVASHANKARI R , SINGHAI P . ECDLP based proxy multi-signature scheme[M]// Advances in Computing and In-formation Technology. Berlin Heidelberg: Springer, 2012:71-79.
|
[12] |
HAN X X , WANG G P , BAO F , et al. An attack to multi-signature schemes based on discrete logarithm[J]. Chinese Journal of Com-puters, 2004,27 (8):1147-1152.
|
[13] |
LIU Y , LUO P ' DAI Y Q . Attack on digital multi-signature scheme based on elliptic curve cryptosystem[J]. Journal of Computer Science & Technology, 2007,22 (1):92-94.
|
[14] |
WANG X F , ZHANG J , WANG S P . Digital multi-signature scheme and its security roof[J]. Chinese Journal of Computer, 2008,31 (1):176-183.
|