[1]DESMEDT Y,FRANKEL Y.Threshold cryptosystems[C].Berlin:Advances in Cryptology-CRYPTO 1989 Proceedoings Lecture Notes in Computer Science,Springer,1990:307-315.
[2]SHAMIR A.Identity-based cryptosystems and signature schemes[C].Berlin:CRYPTO 1984,INCS196,Springer,1985:47-53.
[3]ZHANG J,MAO J.A novel identity-based multity-signcryption scheme[J].Computer Communications,2009,32(1):14-18.
[4]WEI Gao,WANG Zhengyou,LI Fei.An efficient threshold signature scheme without random oracles[C].International Conference on Computational Intelligence and Security,IEEE Computer Society,2009:400-404.
[5]蔡永泉,张雪迪,姜楠.一种新的基于身份的门限签名方案[J].电子学报,2009,37(4):102-105.
[6]BAKE J,ZHENG Yuliang.Identity based threshold signature scheme from the biliner parings[C].Las Vegas:IEEE Computer Society,2004:124-128.
[7]BONEH D,FRANKLIN M.Identity based encryption from the weil pairings[C].Berlin:CRYPTO 2001,LNCS 2139,Springer,2001:213-229.
[8]刘颖,胡予濮,王飞,等.一个高效的基于身份的门限签名方案[J].西安电子科技大学学报:自然科学版,2006,33(2):311-315.
[9]GENNARO R,JARECKI S.Robust threshold signature[C].Berlin:LNCS1070:Advances in Cryptology-CRYPTO 1996,Springer,1996:354-371. |