Author:
Hou Shuquan,Huang Xinyi,Liu Joseph K.,Li Jin,Xu Li
Funder
National Natural Science Foundation of China
ISN Research Fund
Ph.D. Programs Foundation of Ministry of Education of China
Fok Ying Tung Education Foundation
Scientific Research Foundation for the Returned Overseas Chinese Scholars, Ministry of Education of China
Distinguished Young Scholars Fund of Department of Education, Fujian Province, China
Department of Education, Fujian Province
Fujian Normal University Innovative Research Team
Natural Science Foundation of Guangdong Province
Subject
Artificial Intelligence,Information Systems and Management,Computer Science Applications,Theoretical Computer Science,Control and Systems Engineering,Software
Reference32 articles.
1. Universal designated verifier signature proof (or how to efficiently prove knowledge of a signature);Baek,2005
2. The one-more-RSA-inversion problems and the security of Chaum’s blind signature scheme;Bellare;J. Cryptol.,2003
3. Transitive signatures based on factoring and RSA;Bellare,2002
4. Transitive signatures: new schemes and proofs;Bellare;IEEE Trans. Inform. Theory,2005
5. Threshold signatures, multisignatures and blind signatures based on the gap-Diffie-Hellman-group signature scheme;Boldyreva,2003
Cited by
18 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献