SHI Xianzhi LIN Changlu ZHANG Shengyuan TANG Fei. Efficient threshold signature scheme in standard model[J]. Journal of Computer Applications, 2013, 33(01): 15-18.
[1]DESMEDT Y. Society and group oriented cryptography: a new concept [C]// CRYPTO'87: A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology, LNCS 293. Berlin: Springer-Verlag, 1988: 120-127.[2]SHAMIR A. Identity-based cryptosystems and signature schemes [C]// Proceedings of CRYPTO 1984 on Advances in Cryptology, LNCS 196. Berlin: Springer-Verlag, 1984: 47-53.[3]BAEK J, ZHENG Y L. Identity-based threshold signature scheme from the bilinear pairings [C]// Proceedings of the International Conference on Information Technology: Coding and Computing. Washington, DC: IEEE Computer Society, 2004: 124-128.[4]XU F, LYU X. A new identity-based threshold ring signature scheme [C]// Proceedings of the 2011 IEEE International Conference on Systems, Man and Cybernetics. Piscataway: IEEE Press, 2011: 2646-2651.[5]LIU J, HUANG S. Identity-based threshold proxy signature scheme from bilinear pairings [J]. Informatica, 2010, 21(1): 41-56.[6]YANG T, XIONG H, HU J B, et al. A traceable certificateless threshold proxy signature scheme from bilinear pairings [C]// APWeb'11: Proceedings of the 13th Asia-Pacific Web Conference on Web Technologies and Applications, LNCS 6612. Berlin: Springer-Verlag, 2011: 376-381.[7]WATERS B. Efficient identity-based encryption without random oracles [C]// EUROCRYPT'2005: Proceedings of the 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, LNCS 3494. Berlin: Springer-Verlag, 2005: 114-127.[8]PATERSON K G, SCHULDT J C N. Efficient identity-based signatures secure in the standard model [C]// ACISP 2006: Proceedings of the 11th Australasian Conference on Information Security and Privacy, LNCS 4058. Berlin: Springer-Verlag, 2006: 207-222.[9]XIONG H, QIN Z G, LI F G. Identity-based threshold signature in the standard model [J]. International Journal of Network Security, 2010, 10(1): 75-85.[10]GAO W, WANG G L, WANG X L, et al. Efficient identity-based threshold signature scheme from bilinear in the standard model [EB/OL]. [2012-02-19]. http://eprint.iacr.org/2012/073. pdf.[11]谷科,贾维嘉,姜春林.高效安全的基于身份的签名方案[J].软件学报,2011,22(6):1350-1360.[12]GENNARO R, JAREAKI S, KRAWCZYK H, et al. Secure distributed key generation for discrete-log based cryptosystem [J]. Journal of Cryptology, 2007, 20(1): 51-83.