1. Atapoor, S.: Identity-based threshold signatures from isogenies. Cryptology ePrint Archive, Paper 2023/1459 (2023). https://eprint.iacr.org/2023/1459
2. Atapoor, S., Baghery, K., Cozzo, D., Pedersen, R.: CSI-SharK: CSI-FiSh with Sharing-friendly Keys. In: Simpson, L., Rezazadeh Baee, M.A. (eds.) Information Security and Privacy - 28th Australasian Conference, ACISP 2023, Brisbane, QLD, Australia, 5–7 July 2023, Proceedings. LNCS, vol. 13915, pp. 471–502. Springer, Cham (2023). https://doi.org/10.1007/978-3-031-35486-1_21
3. Atapoor, S., Baghery, K., Cozzo, D., Pedersen, R.: VSS from distributed ZK proofs and applications. In: Guo, J., Steinfeld, R. (eds.) Advances in Cryptology - ASIACRYPT 2023–29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, 4–8 December 2023, Proceedings. LNCS. Springer, Cham (2023)
4. Baek, J., Zheng, Y.: Identity-based threshold signature scheme from the bilinear pairings. In: International Conference on Information Technology: Coding and Computing (ITCC 2004), Las Vegas, Nevada, USA, 5–7 April 2004, vol. 1, pp. 124–128. IEEE Computer Society (2004)
5. Lecture Notes in Computer Science;K Baghery,2021