[1] |
CHENG Yage, HU Mingsheng, GONG Bei, WANG Lipeng, XU Erfeng.
Dynamic Threshold Signature Scheme with Strong Forward Security
[J]. Computer Engineering and Applications, 2020, 56(5): 125-134.
|
[2] |
XIAO Shuai, WANG Xu’an, PAN Feng.
Elliptic Curve Digital Signature Algorithm Without Modular Inverse Operation
[J]. Computer Engineering and Applications, 2020, 56(11): 118-123.
|
[3] |
ZHOU Ping1,2, ZHANG Wei2, ZHANG Wenfang1.
Efficient multi-policy safe authentication scheme for virtual enterprises
[J]. Computer Engineering and Applications, 2017, 53(23): 91-96.
|
[4] |
TIAN Juanhong, ZHANG Jianzhong, LI Yanping.
Robust multi-proxy multi-blind signature scheme
[J]. Computer Engineering and Applications, 2017, 53(1): 130-133.
|
[5] |
MI Junli1, ZHANG Jianzhong2, CHEN Shouting1, LIU Fenghua1.
Leakage-resilient designated verifier blind proxy signature scheme
[J]. Computer Engineering and Applications, 2016, 52(22): 123-126.
|
[6] |
CAO Xin, WEI Shimin, ZHUO Zepeng.
Security analysis of three forward secure proxy signature schemes
[J]. Computer Engineering and Applications, 2015, 51(7): 98-100.
|
[7] |
HE Bin, DU Weizhang.
Analysis and improvement of forward secure certificateless proxy blind signature scheme
[J]. Computer Engineering and Applications, 2013, 49(22): 104-109.
|
[8] |
HUANG Meijuan, DU Hongzhen.
Provable secure ID-based threshold proxy signature scheme
[J]. Computer Engineering and Applications, 2013, 49(20): 77-81.
|
[9] |
ZHANG Jianzhong, XIE Junqin.
Improved threshold signature scheme for resisting conspiracy attack
[J]. Computer Engineering and Applications, 2013, 49(18): 52-55.
|
[10] |
XIE Junqin, ZHANG Jianzhong.
[(t,n)] threshold signature scheme with safety and tracability without trusted party
[J]. Computer Engineering and Applications, 2013, 49(16): 77-81.
|
[11] |
XU Taiping, CHEN Yong.
Threshold hybrid proxy multi-signature scheme against conspiracy attack
[J]. Computer Engineering and Applications, 2013, 49(14): 73-76.
|
[12] |
CAO Tianqing, ZHANG Jianzhong.
New certificateless threshold proxy signature scheme
[J]. Computer Engineering and Applications, 2012, 48(9): 57-59.
|
[13] |
HE Junjie, SUN Fang, QI Chuanda.
Analysis and improvement of proxy blind signature scheme
[J]. Computer Engineering and Applications, 2012, 48(24): 81-84.
|
[14] |
ZHANG Jianzhong1, GAO Huanhuan1,2, ZHAO Bingji3.
ID-based threshold signature scheme without random oracles
[J]. Computer Engineering and Applications, 2012, 48(23): 77-80.
|
[15] |
WANG Jiandong, ZOU Hui.
Dynamic threshold signature scheme under special access right
[J]. Computer Engineering and Applications, 2012, 48(20): 123-125.
|