Citation: | WU Chunhui, CHEN Xiaofeng, LONG Dongyang. A New Effcient On-line/Off-line Threshold Signature Scheme[J]. Chinese Journal of Electronics, 2009, 18(2): 321-324. |
[1] | GUO Ping, ZHU Jian, CHEN Haizhu, YANG Ruilong. A Linear-Time Solution for All-SAT Problem Based on P System[J]. Chinese Journal of Electronics, 2018, 27(2): 367-373. DOI: 10.1049/cje.2018.01.008 |
[2] | JIA Jianwei, LIU Jinhui, ZHANG Huanguo. Cryptanalysis of a Key Exchange Protocol Based on Commuting Matrices[J]. Chinese Journal of Electronics, 2017, 26(5): 947-951. DOI: 10.1049/cje.2017.08.013 |
[3] | XIANG Xinyin, LI Hui, ZHAO Xingwen. Key Evolving Attribute-Based Signature Under Short Integer Solution Problem[J]. Chinese Journal of Electronics, 2016, 25(5): 901-906. DOI: 10.1049/cje.2016.08.042 |
[4] | ZHU Yan, WANG Shanbiao, MA Di, FENG Rongquan. Identity-Based Encryption on RSA Without Pairings and Key Escrow[J]. Chinese Journal of Electronics, 2014, 23(4): 842-850. |
[5] | ZHANG Qikun, ZHANG Quanxin, MA Zhongmei, TAN Yu'an. An Authenticated Asymmetric Group Key Agreement for Imbalanced Mobile Networks[J]. Chinese Journal of Electronics, 2014, 23(4): 827-835. |
[6] | LIU Shengli, TILBORG Henk van, WENG Jian, CHEN Kefei. Authentication Codes from ε-ASU Hash Functions with Partially Secret Keys[J]. Chinese Journal of Electronics, 2014, 23(4): 790-793. |
[7] | YANG Xiaodong, WANG Caifen, ZHANG Lei, QIU Jianbin. On-line/Off-line Threshold Proxy Re-Signatures[J]. Chinese Journal of Electronics, 2014, 23(2): 248-253. |
[8] | GUO Yuanbo, MA Jianfeng, WANG Chao, YANG Kuiwu. Mechanism Design Based Nodes Selection Model for Threshold Key Management in MANETs[J]. Chinese Journal of Electronics, 2013, 22(4): 820-825. |
[9] | YANG Xiaodong and WANG Caifen. Threshold Proxy Re-signature Schemes in theStandard Model[J]. Chinese Journal of Electronics, 2010, 19(2): 345-350. |
[10] | DU Hongzhen, WEN Qiaoyan. Effcient Certificateless Designated Verifier Signatures and Proxy Signatures[J]. Chinese Journal of Electronics, 2009, 18(1): 95-100. |