[1] Desmedt Y. Society and Group Oriented Cryptography: a New Concept[C]//Proceedings of Advances in Cryptology-CRYPT'87. Berlin: Springer-Verlag Heidelberg, 1987: 120-127.
[2] Desmedt Y. Threshold Cryptography[J]. European Trans on Telecommunications, 1994, 5(4): 449-457.
[3] Feige U, Fiat A, Shamir A. Zero-knowledge Proofs of Identity[J]. Journal of Cryptology, 1988, 1(2): 77-94.
[4] Abdalla M, Miner S, Namprempre C. Forward Security in Threshold Signature Schemes[C]//Proceedings of Topics in Cryptology-CT-RSA 2001. Berlin: Springer-Verlag Heidelberg, 2001: 143-158.
[5] Wang H, Xiao H, Wei S M, et al. An Efficient Adaptively Secure Threshold Feige-Fiat-Shamir Signature Scheme[C]//2010 Second International Conference on Wireless Networks and Information Systems (WNIS 2010). Chongqing: WNIS, 2010: 171-174.
[6] Canetti R, Gennaro R, Jarecki S, et al. Adaptive Security for Threshold Cryptosystems[C]//Proceedings of Advances in Cryptology-CRYPT'99[C]. Berlin: Springer-Verlag, 1999: 98-115.
[7] Chu C K, Liu L S, Tzeng W G. A Threshold GQ Signature Scheme[C]//Proceedings of Applied Cryptography and Network Security Conference—ACNS 2003. Berlin: Springer-Verlag Heidelberg, 2003: 137-150.
[8] Goldreich O. A Note on Computational Indistinguishability[J]. Information Processing Letters, 1990, 34(5): 227-281.
[9] Gennaro R, Halevi S, Rabin T. Secure Hash-and-sign Signatures without the Random Oracle[C]//Proceedings of Advances in Cryptology—EUROCRYPT'99. Berlin: Springer-Verlag Heidelberg, 1999: 123-139.
[10] Cramer R, Shoup V. Signature Schemes Based on the Strong RSA Assumption[J]. ACM Trans on Information and System Security, 2000, 3(3): 161-185.
[11] Frankel Y, MacKenzie P D, Yung M. Adaptively Secure Distributed Public-key Systems[J]. Theoretical Computer Science, 2002, 287(2): 535-561.
[12] Pointcheval D, Stern J. Security Arguments for Digital Signatures and Blind Signatures[J]. Journal of Cryptology, 2000, 13(3): 361-396.
[13] Bellare M, Rogaway P. Random Oracles are Practical: a Paradigm for Designing Efficient Protocols[C]//Proceedings of the First Annual ACM Conferenceon Computer and Communications Security. New York: ACM Press, 1993: 62-73.
[14] Wang H, Feng D G. Robust Threshold FFS Signature Scheme[C]//Proceedings of the 8th Joint International Computer Conference—JICC 2002. Hangzhou: Zhejiang University Press, 2002: 382-384. |