Author:
Li Meng,Ding Hanni,Wang Qing,Zhang Zijian,Conti Mauro
Publisher
Springer Nature Singapore
Reference19 articles.
1. Desmedt, Y., Frankel, Y.: Threshold cryptosystems. In: Proceedings of 6th Annual International Cryptology Conference (CRYPTO), pp. 307–315. Santa Barbara, USA (1989)
2. Shoup, V.: Practical threshold signatures. In: International Conference on the Theory and Application of Cryptographic Techniques(EUROCRYPT), pp. 14–18. Bruges, Belgium (2000)
3. Fouque, P., Stern, J.: Fully distributed threshold RSA under standard assumptions. International Conference on the Theory and Application of Cryptology and Information Security(ASIACRYPT), pp. 310–330. Gold Coast, Australia (2001)
4. Damgård, I., Koprowski, M.: Practical threshold RSA signatures without a trusted dealer. In: International Conference on the Theory and Applications of Cryptographic Techniques(EUROCRYPT), pp. 152–165. Innsbruck, Austria (2001)
5. Micali, S., Ohta, K., Reyzin, L.: Accountable-subgroup multi signatures: extended abstract. In: Proceedings of 8th ACM Conference on Computer and Communications Security (CCS), pp. 245–254. Philadelphia, USA (2001)