[1] |
ANITHA T N , JAYANTH A . Efficient threshold signature scheme[J]. International Journal of Advanced Computer Science and Applications, 2012,3(1): 112-116.
|
[2] |
CRUTCHFIELD C , MOLNAR D , TURNER D ,et al. Generic on-line/off-line threshold signatures[A]. Proceedings of Public Key Cryptography[C]. New York,NY,USA, 2006. 58-74.
|
[3] |
SHAMIR A , TAUMAN Y . Improved online/offline signature schemes[A]. Proceedings of Advances in Cryptology[C]. Santa Barbara,CA,USA, 2001. 355-367.
|
[4] |
BRESSON E , CATALANO D , GENNARO R . Improved on-line/off-line threshold signatures[A]. Proceedings of Public Key Cryptography[C]. Beijing,China, 2007. 217-232.
|
[5] |
KRAWCZYK H , RABIN T . Chameleon signature[A]. Proceedings of NDSS’00[C]. San Diego,CA,USA, 2000. 143-154.
|
[6] |
HARN L , HSIN W J , LIN C L . Efficient on-line/off-line signature schemes based on multiple-collision trapdoor hash families[J]. The Computer Journal, 2010,53(9): 1478-1484.
|
[7] |
LIANG B H , HUANG T H . A novel and effective on-line/off-line threshold signature project[J]. Computer Simulation, 2009,26(9): 92-95.
|
[8] |
CHEN X F , ZHANG F G , TIAN H B ,et al. Efficient generic on-line/off-line (threshold) signatures without key exposure[J]. Information Sciences, 2008,178(21): 4192-4203.
|
[9] |
TANG C M , YAO Z G , XIE D Q . Adaptively secure on-line/off-line threshold signatures[A]. Proceedings of NSWCTC '09[C]. Guangzhou,China, 2009. 508-511.
|
[10] |
GAO C Z , WEI B D , XIE D Q ,et al. How to construct efficient on-line/off-line threshold signature schemes through the simulation approach[J]. Concurrency and Computation:Practice and Experience, 2009,21(10): 1351-1372.
|
[11] |
WANG S , LIU W , XIE Q . Certificateless signature scheme without bilinear pairings[J]. Journal on Communications, 2012,33(4): 93-98.
|
[12] |
CHEN X F , SUSILO W , ZHANG F G ,et al. Identity-based trapdoor mercurial commitment and applications[J]. Theoretical Computer Science, 2011,42(39): 5498-5512.
|
[13] |
JOSEPH K L , BAEK J , ZHOU J Y ,et al. Efficient online/offline identity-based signature for wireless sensor network[J]. International Journal of Information Security, 2010,9(4): 287-296.
|
[14] |
PEDERSEN T P . Non-interactive and information-theoretic secure verifiable secret sharing[A]. Proceedings of CRYPTO[C]. Santa Barbara,California,USA, 1991. 129-140.
|
[15] |
MCELIECE R J , SARWATE D V . On sharing secrets and reed-solomon codes[J]. Communications of the ACM, 1981,24(9): 583-584.
|
[16] |
CANETTI R , GENNARO R , JARECKI S ,et al. Adaptive security for threshold cryptosystems[A]. Proceedings of CRYPTO[C]. California,USA, 1999. 98-115.
|