[1] |
CHENG Yage, HU Mingsheng, GONG Bei, WANG Lipeng, XU Erfeng.
Dynamic Threshold Signature Scheme with Strong Forward Security
[J]. Computer Engineering and Applications, 2020, 56(5): 125-134.
|
[2] |
TIAN Juanhong, ZHANG Jianzhong, LI Yanping.
Robust multi-proxy multi-blind signature scheme
[J]. Computer Engineering and Applications, 2017, 53(1): 130-133.
|
[3] |
LAI Zhongxi, ZHANG Anjie, ZHANG Zhanjun.
Improved algorithms for computing 7P and 7kP on elliptic curves
[J]. Computer Engineering and Applications, 2016, 52(1): 29-32.
|
[4] |
LAI Zhongxi, LIN Junhuan, ZHANG Zhanjun.
Study on fast method of scalar multiplication on elliptic curves over Prime field [GF(P)]
[J]. Computer Engineering and Applications, 2015, 51(4): 100-104.
|
[5] |
LAI Zhongxi, ZHANG Zhanjun.
Optimizing fast field operation in elliptic curves
[J]. Computer Engineering and Applications, 2015, 51(22): 115-118.
|
[6] |
LAI Zhongxi, ZHANG Zhanjun, TAO Dongya.
Study on fast method of field operation in elliptic curves
[J]. Computer Engineering and Applications, 2014, 50(3): 67-70.
|
[7] |
ZHANG Jianzhong, XIE Junqin.
Improved threshold signature scheme for resisting conspiracy attack
[J]. Computer Engineering and Applications, 2013, 49(18): 52-55.
|
[8] |
XU Taiping, CHEN Yong.
Threshold hybrid proxy multi-signature scheme against conspiracy attack
[J]. Computer Engineering and Applications, 2013, 49(14): 73-76.
|
[9] |
LI Haifeng1, LAN Caihui2, ZUO Weiping1, MA Haiyun1.
ID-based threshold group signature scheme without trusted party
[J]. Computer Engineering and Applications, 2012, 48(32): 89-93.
|
[10] |
ZHANG Jianzhong1, GAO Huanhuan1,2, ZHAO Bingji3.
ID-based threshold signature scheme without random oracles
[J]. Computer Engineering and Applications, 2012, 48(23): 77-80.
|
[11] |
WANG Jiandong, ZOU Hui.
Dynamic threshold signature scheme under special access right
[J]. Computer Engineering and Applications, 2012, 48(20): 123-125.
|
[12] |
ZHANG Jianzhong, ZHOU Yingying.
Further cryptanalysis and improvement of threshold signature scheme
[J]. Computer Engineering and Applications, 2012, 48(19): 106-108.
|
[13] |
LIU Wen, ZHANG Jianzhong.
Proxy blind multi-signature scheme based on ElGamal signature
[J]. Computer Engineering and Applications, 2012, 48(10): 95-97.
|
[14] |
XU Guangbao,JIANG Donghuan.
Threshold signature scheme with privileged member
[J]. Computer Engineering and Applications, 2011, 47(9): 83-85.
|
[15] |
YUE Sheng,XIN Xiaolong.
Threshold signature scheme without trusted party
[J]. Computer Engineering and Applications, 2011, 47(3): 87-89.
|