Citation: | CAI Yong-quan, CHENG Fu-lai. Threshold Signature Scheme Based on Factorial Decompose Theorem of Polynomial[J]. Journal of Beijing University of Technology, 2012, 38(5): 727-729. DOI: 10.3969/j.issn.0254-0037.2012.05.017 |
[1] |
DESMEDT Y,FRANKEL Y.Shared generation ofauthenticators and signatures[C]∥Advances inCryptology-Crypto'91 Proceedings.Berlin:Springer-Verlag,1992:457-469.
|
[2] |
WANG C T,LIN C H,CHANG C C.Threshold signatureschemes with traceable signers in group communications[J].Computer Communications,1998,21(8):771-776.
|
[3] |
XU Q L.A modified threshold RSA digital signaturescheme[J].Chinese Journal of Computers,2000,23(5):449-453.
|
[4] |
LI C M,HWANG T,LEE N Y.Remark on the thresholdRSA signature scheme[C]∥Advances in Cryptology-Crypto'93 Proceedings.Berlin:Springer-Verlag,1994:413-420.
|
[5] |
王斌,李建华.无可信中心的(t,n)限签名方案[J].计算机学报,2003,26(11):1581-1584.WANG Bin,LI Jian-hua.(t,n)threshold signaturescheme without a trusted party[J].Chinese Journal ofComputers,2003,26(11):1581-1584.(in Chinese)
|
[6] |
XIE Qi,YU Xiu-yuan.A new(t,n)threshold signaturescheme withstanding the conspiracy attack[J].WuhanUniversity Journal of Natural Sciences,2005,10(1):107-110.
|
[7] |
张文芳,王小敏,何大可.一个无可信中心(t,n)门限签名方案的安全缺陷及其改进[J].铁道学报,2008,30(3):40-45.ZHANG Wen-fang,WANG Xiao-min,HE Da-ke.Securityanalysis of the(t,n)threshold signature scheme without atrusted party and its improvement[J].Journal of the ChinaRailway Society,2008,30(3):40-45.(in Chinese)
|
[8] |
张兴兰.一种基于有限域上的多项式分解定理的群签名方案[J].微电子学与计算机,2010,27(3):163-166.ZHANG Xing-lan.An efficient group signature schemebased on factorial decompose theorem of polynomial withfactors in finite field[J].Microelectronics&Computer,2010,27(3):163-166.(in Chinese)
|