Citation: | Ma Chunbo, He Dake. A New Chameleon Threshold Signature Based on Bilinear Pairing[J]. Journal of Computer Research and Development, 2005, 42(8): 1427-1430. |
[1] | An Haoyang, He Debiao, Bao Zijian, Peng Cong, Luo Min. Ring Signature Based on the SM9 Digital Signature And Its Application in Blockchain Privacy Protection[J]. Journal of Computer Research and Development, 2023, 60(11): 2545-2554. DOI: 10.7544/issn1000-1239.202330265 |
[2] | Chen Ming, Yuan Shaoliang. Provably Secure Identity-Based Multi-Proxy Signature Scheme in Standard Model[J]. Journal of Computer Research and Development, 2016, 53(8): 1879-1892. DOI: 10.7544/issn1000-1239.2016.20150197 |
[3] | Zhang Wenfang, Wang Xiaomin, He Dake. An Improved VCA Interaction Model for Virtual Enterprises Based on Threshold RSA Signature[J]. Journal of Computer Research and Development, 2012, 49(8): 1662-1667. |
[4] | Wang Feng, Zhou Yousheng, Gu Lize, Yang Yixian. A Multi-Policies Threshold Signature Scheme with Group Verifiability[J]. Journal of Computer Research and Development, 2012, 49(3): 499-505. |
[5] | Chen Shaozhen, Wang Wenqiang, Peng Shujuan. Efficient AttributeBased Ring Signature Schemes[J]. Journal of Computer Research and Development, 2010, 47(12). |
[6] | Yu Jia, Kong Fanyu, Hao Rong, Li Daxing. A Note on a Forward Secure Threshold Signature Scheme from Bilinear Pairing[J]. Journal of Computer Research and Development, 2010, 47(4): 605-612. |
[7] | Chen Hu, Zhu Changjie, Song Rushun. Efficient Certificateless Signature and Group Signature Schemes[J]. Journal of Computer Research and Development, 2010, 47(2): 231-237. |
[8] | Li Huixian, Cai Wandong, Pang Liaojun. A Secure Dynamic Threshold Signature Scheme[J]. Journal of Computer Research and Development, 2007, 44(9): 1545-1549. |
[9] | Peng Huaxi and Feng Dengguo. A Forward Secure Threshold Signature Scheme from Bilinear Pairing[J]. Journal of Computer Research and Development, 2007, 44(4): 574-580. |
[10] | Wu Zhongdong, Xie Weixin, Yu Jianping. A Security Enhancement Method of a Verifiable Threshold Signature Scheme Based on the Elliptic Curve[J]. Journal of Computer Research and Development, 2005, 42(4): 705-710. |