1. Bellare, M., Rogaway, P.: Random Oracles are Practical: a paradigm for designing efficient protocols. In: Proc. of 1st ACM Conference on Computer and Communication Security, pp. 62–73 (1993)
2. Canetti, R., Goldreich, O., Halevi, S.: The Random Oracle Methodology. In: Proc. of the 30th Annual ACM Symposium on Theory of Computing, STOC, pp. 209–218 (1998) (revisited)
3. Lecture Notes in Computer Science;Y. Desmedt,1992
4. Doi, H., Okamoto, E., Mambo, M., Uyematsu, T.: Multisignature Scheme with Specified Order. In: Proc. of the 1994 Symposium on Cryptography and Information Security, SCIS94-2A, January 27-29 (1994)
5. Doi, H., Okamoto, E., Mambo, M.: Multisignature Schemes for Various Group Structures. In: The 36-th Annual Allerton Conference on Communication, Control and Computing, pp. 713–722 (1999)