[1]
|
Y. Desmedt and Y. Frankel, “Shared Generation of Authenticators and Signatures,” Proceedings of Cryptology-CRYPTO’91, Springer-Verlag, Berlin, 1991, pp. 457-469.
|
[2]
|
C. M. Li, T. Hwang and N. Y. Lee, “Remark on the Threshold RSA Signature Scheme,” Stinosn D. LNCS 773: Advances in Cryptology-CRYPTO’91, Springer-Verlag, Berlin, 1994, pp. 413-420.
|
[3]
|
R. Gennaro, S. Jareeki, H. Krawczyk, et a1., “Robust Threshold DSS,” BMaurer U. LNCS 1109: Advances in Cryptology-EUROCRYPT’96, Springer, Berlin, 1996, pp. 157-172.
|
[4]
|
C. T. Wang and C. H. Lin, “Threshold Signature Schemes with Trace Able Signers in Group Communications,” Computer Communications, Vol. 21, No. 8, 1998, pp. 771-776. doi:10.1016/S0140-3664(98)00142-X
|
[5]
|
L. Ham, “Group-Oriented (t, n) Threshold Digital Signature Scheme and Digital Multi-Signature,” IEEE Proceedings of Computers and Digital and Technique, Vol. 141, No. 5, 1994, pp. 307-313.
doi:10.1049/ip-cdt:19941293
|
[6]
|
F. Hess, “Efficient Identity Based Signature Schemes Based on Parings,” Proceedings of Selected Areas in Crypto-graphy. SAC’02, Springer, Berlin, 2003, pp. 310-324.
|
[7]
|
X. Chen, F. Zhang and K. Kim, “A New ID Based Group Signature Scheme from Bilinear Pairings [EB/OL],” 2003. http://eprint. Iacr.org/2003/1 16.pdf.
|
[8]
|
M. C. Gorantla and A. Saxena, “An Efficient Certificate-Less Signature Scheme,” Proceedings of Computational Intelligence and Security, Springer, Berlin, 2006, pp. 110-116.
|