1. S. Araki, S. Uehara, K. Imamura, Convertible limited verifier signature based on Horster’s authenticated encryption, in: Proceedings of 1998 Symposium on Cryptography and Information Security, 1998, pp. 32–36.
2. A convertible multi-authenticated encryption scheme for group communications;Chang;Information Sciences,2008
3. Threshold signature for group communications without shared distribution center;Chang;Future Generation Computer Systems,2004
4. Convertible authenticated encryption scheme without using conventional one-way function;Chien;International Journal of Informatica,2003
5. VSH, an efficient and provable collision-resistant hash function;Contini,2006