Citation: | ZHAN Yang, TIAN Hai-bo, CHEN Xiao-feng, WANG Yu-min. ID-based Chameleon Hash Scheme and Signature Without Key Escrow[J]. Journal of Beijing University of Technology, 2010, 36(5): 685-688. |
[1] | CAI Yong-quan, XUE Fei, YANG Yi. Rational Threshold Signature Based on Hierarchical Key[J]. Journal of Beijing University of Technology, 2013, 39(9): 1366-1370. |
[2] | ZHOU You-sheng, XIN Yang, QING Si-han, YANG Yi-xian. Forward-backward Secure Group Signature Scheme[J]. Journal of Beijing University of Technology, 2012, 38(5): 736-739. |
[3] | CAI Yong-quan, CHENG Fu-lai. Threshold Signature Scheme Based on Factorial Decompose Theorem of Polynomial[J]. Journal of Beijing University of Technology, 2012, 38(5): 727-729. |
[4] | CAI Yong-quan, ZHANG En, HE Jing-yang. (t,n) Threshold Signature Scheme Withstanding the Conspiracy Attack[J]. Journal of Beijing University of Technology, 2011, 37(8): 1231-1235. |
[5] | LIU Zhen-hua, ZHANG Xiang-song, TIAN Xu-an, HU Yu-pu. Identity-based Signature Scheme with Partial Message Recovery in the Standard Model[J]. Journal of Beijing University of Technology, 2010, 36(5): 654-658. |
[6] | DING Li, ZHOU Yuan, QIAN Hai-feng. Security Analysis and Improvement of Digital Multi-signature on the Generalized Conic Curve[J]. Journal of Beijing University of Technology, 2010, 36(5): 646-650. |
[7] | YI Xiao-lin, ZHOU Wei, LU Peng-cheng. A Blind Signature Scheme Based on Hyperelliptic Curve[J]. Journal of Beijing University of Technology, 2010, 36(2): 261-267. |
[8] | CAI Yong-quan, WANG Ya-li. Conference Key Agreement Protocol Based on Elliptic Curve[J]. Journal of Beijing University of Technology, 2007, 33(8): 870-873. |
[9] | CAI Mian, KANG Li. Undeniable Multiple Grade Proxy Signature Scheme[J]. Journal of Beijing University of Technology, 2006, 32(10): 953-957. |
[10] | CAI Mian, SUN Xing-fang. A Secure Authorized Group Signatures[J]. Journal of Beijing University of Technology, 2006, 32(5): 431-435. |