1. Ring signatures: stronger definitions, and constructions without random oracles;Bender;J. Cryptology,2009
2. Threshold ring signatures and applications to ad-hoc groups;Bresson,2002
3. Identity based threshold ring signature;Chow,2005
4. Identity based ring signature: why, how and what next;Chow,2005
5. Escrowed linkability of ring signatures and its applications;Chow,2006