[1] |
陈立全, 朱政, 王慕阳 ,等. 适用于移动互联网的门限群签名方案[J]. 计算机学报, 2018,425(5): 86-101.
|
|
CHEN L Q , ZHU Z , WANG M Y ,et al. Threshold group signature scheme for mobile Internet application[J]. Chinese Journal of Computers, 2018,425(5): 86-101.
|
[2] |
JIA X , WANG D , NIE D ,et al. A new threshold changeable secret sharing scheme based on the Chinese Remainder Theorem[J]. Information Sciences, 2019: 13-30.
|
[3] |
RUI G , SHI H , ZHAO Q ,et al. Secure attribute-based signature scheme with multiple authorities for blockchain in electronic health records systems[J]. IEEE Access, 2018,6: 11676-11686.
|
[4] |
SUN Y , ZHANG R , WANG X ,et al. A decentralizing attribute-based signature for healthcare blockchain[C]// 2018 27th International Conference on Computer Communication and Networks (ICCCN). 2018.
|
[5] |
YU Y L , CHEN T S . An efficient threshold group signature scheme[J]. Applied Mathematics and Computation, 2005,167(1): 362-371.
|
[6] |
XIA X S , HONG F , GENG Y J ,et al. Efficient dynamic threshold group signature scheme based on elliptic curve cryptosystem[J]. Journal of Modern Transportation, 2008,16(1): 18-23.
|
[7] |
HWANG J Y , KIM H J , LEE D H ,et al. An enhanced (t,n) threshold directed signature scheme[J]. Information Sciences, 2014,275: 284-292.
|
[8] |
LI Y , CHENG S . Privacy preserved mobile sensing using region-based group signature[J]. IEEE Access, 2018: 61556-61568.
|
[9] |
DAN B , GENNARO R , GOLDFEDER S ,et al. Threshold cryptosystems from threshold fully homomorphic encryption[C]// Annual International Cryptology Conference. 2018: 565-596.
|
[10] |
LI S , WANG W , ZHOU B ,et al. A (M,m) authentication scheme against mobile sink replicated attack in unattended sensor networks[J]. IEEE Wireless Communication Letters, 2017
|
[11] |
谭亦夫, 李子臣 . 基于 Shamir 门限秘密分享的图像可视加密算法[J]. 网络与信息安全学报, 2018,4(7): 73-80.
|
|
TAN Y F , LI Z C . Image visualization encryption algorithm based on Shamir threshold secret key sharing[J]. Journal of Network and Information Security, 2018,4(7): 73-80.
|
[12] |
张兴兰, 崔遥 . 基于群签名的属性加密方案[J]. 网络与信息安全学报, 2019,5(1): 15-21.
|
|
ZHANG X L , CUI Y . Attribute-based encryption schema with group signatures[J]. Journal of Network and Information Security, 2019,5(1): 15-21.
|
[13] |
ISERN D , ANDREU P , HUGUET L ,et al. On the practicability of using group signatures on mobile devices:implementation and performance analysis on the android platform[J]. International Journal of Information Security, 2015,14(4): 335-345.
|
[14] |
DAHSHAN H , KAMAL A , ROHIEM A . A threshold blind digital signature scheme using elliptic curve dlog-based cryptosystem[C]// 2015 IEEE 81st Vehicular Technology Conference. 2015.
|
[15] |
谢东, 李佳佳, 沈忠华 . 一种新的基于椭圆曲线的门限群签名方案[J]. 杭州师范大学学报(自然科学版), 2013,12(1): 57-60.
|
|
XIE D , LI J J , SHEN Z H . A new threshold signature scheme based on elliptic curve crypt system[J]. Journal of Hangzhou Normal University (Natural Science Edition), 2013,12(1): 57-60.
|
[16] |
彭娅 . 门限数字签名理论及应用研究[D]. 广州:中山大学, 2010.
|
|
PENG Y . Research on Theory and Application of Threshold Digital Signature[D]. Guangzhou:Sun Yat-sen University, 2010.
|
[17] |
Shamus Software Ltd. MIRACL Library[EB].
|
[18] |
HE D , ZEADALLYS , XU B ,et al. An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad-hoc networks[J]. IEEE Transactions on Information Forensics and Security, 2015,10(12): 2681-2691.
|
[19] |
HE D , ZEADYLLY S , XU B ,et al. An efficient identity-based conditionalprivacy-preserving authentication scheme for vehicular Ad Hoc networks[J]. IEEE Trans Information Forensics Security, 2015,10(12): 2681-2691.
|
[20] |
YING B , NAYAK A . Lightweight remote user authentication protocol for multi-server 5G networks using self-certified public key cryptography[J]. Journal of Network and Computer Applications, 2019,131: 66-74.
|