2. Desmedt Y, Frankel Y. Threshold cryptosystems. Advances in Cryptology: Proceedings of the 9th Annual International Cryptology Conference (CRYPTO’89), Aug 20-24, Santa Barbara, CA, USA. LNCS 435. Berlin, Germany: Springer-Verlag, 1990: 307-315
3. Chang C C, Hwang M S. Parallel computation of the generating keys for RSA cryptosystems. Electronics Letters, 1996, 32(15): 1365-1366
4. Shamir A. How to share a secret. Communications of the ACM, 1979, 22(11): 612-613
5. Cai Y Q, Zhang K. A new threshold signature scheme based on fuzzy biometric identity. Progress in Natural Science, 2009, 19(8): 1021-1025
6. Lu R X, Lin X D, Cao Z F, et al. New threshold directed signature scheme with provable security. Information Sciences, 2008, 178(3): 756-765
7. Chu C K, Tzeng W G. Optimal resilient threshold GQ signatures. Information Sciences, 2007, 177 (8): 1834-1851
8. Hu J H, Zhang J Z. Cryptanalysis and improvement of a threshold proxy signature scheme. Computer Standards & Interfaces, 2009, 31 (1): 169-173
9. Hong X. Efficient threshold proxy signature protocol for mobile agents. Information Science, 2009, 179(24): 4243-4248
10. Kang B Y, Boyd C, Dawson E. A novel nonrepudiable threshold multi-proxy multi-signature scheme with shared verification. Computers & Electrical Engineering, 2009, 35(1): 9-17
11. Chung Y F, Huang K H, Chen T S. Threshold authenticated encryption scheme using labor-division signature. Computer Standards & Interfaces, 2009, 31(2): 300-304
12. Chang S, Wong D S, Mu Y, Zhang Z F Certificate less threshold ring signature. Information Sciences, 2009, 179(20): 3685-3696
13. Hwang S M,Chang T Y. Threshold signatures: current status and key issues. International Journal of Network Security, 2005, 1(3): 123-137
14. Lee N Y. Threshold signature scheme with multiple signing policies. IEE Proceedings: Computers and Digital Techniques, 2001, 148(2): 95-99
15. Li C, Hwang T, Lee N. Threshold multi-signature schemes where suspected forgery implies traceability of adversarial share-holders. Advances in Cryptology: Proceedings of the Workshop on the Theory and Applications of Cryptographic Techniques (Eurocrypt’94), May 9-12, 1994, Perugia, Italy. LNCS 950. Berlin, Germany: Springer-Verlag, 1995: 413-419
16. Wang C T, Chang C C, Lin C H. Generalization of threshold signature and authenticated encryption for group communications. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2000, E83-A(6): 1228-1237
17. Hsu C L, Wu T S, Wu T Z. Group-oriented signature scheme with distinguished signing authorities. Future Generation Computer Systems, 2004, 20(5): 865-873
18. Shao J, Cao Z F. A traceable threshold signature scheme with multiple signing policies. Computers & Security, 2006, 25 (3): 201-206
19. Pang L J, Jiao L C. Changeable threshold signature scheme without a trusted center. Acta Electronica Sinica, 2008, 36(8): 1559-1563 (in Chinese).
20. Tseng Y M, Jan J K, Chien H Y. On the security of generalization of threshold signature and authenticated encryption. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2001, E84-A(10): 2606-2609
21. Hsu C L, Wu T S, Wu T C. Improvements of generalization of threshold signature and authenticated encryption for group communications. Information Processing Letters, 2002, 81(1): 41-45
22. Lee N Y. The security of the improvement on the generalization of threshold signature and authenticated encryption. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2002, E85-A(10): 2364-2367
23. Chang T Y, Yang C C, Hwang M S. Threshold untraceable signature for group communications. IEE Proceedings: Communications, 2004, 151(2): 179-184
24. ElGamal T. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, 1985, 31 (4): 469-472
25. Cormen T H, Leiserson C E, Rivest R L. Introduction to algorithms. 2nd Edition. Cambridge, MA, USA: MIT Press, 2001: 859-861 |