Desmedt Y. Society and group oriented cryptography: A new concept. In: Pomerance C ed..[J].Advances in Cryptolog-Crypto87 Proceedings, LNCS 293. Berlin, Springer-Verlag.1988,:-[2]Boyd C. Digital multisignatures. In: Baker H and Piper F editors, Cryptography and Coding, Oxford, Clarendon Press, 1989: 241-246.Croft R A, Harris S P. Public-key cryptography and reusable shared secrets. In: Baker H and Piper F editors, Cryptography and Coding, Oxford, Clarendon Press, 1989: 189-201.[3]Desmedt Y.[J].Frankel Y. Threshold cryptosystems. In: Brassard G ed., Advances in Cryptology-Crypto89 Proceedings, LNCS 435. Berlin, Springer-Verlag.1990,:-[4]Desmedt Y.[J].Frankel Y. Shared generation of authenticators and signatures. In: Feigenbaum J ed., Advances in Cryptology - Crypto91 Proceedings, Lecture Notes in Computer Science 576, Berlin, Springer-Verlag.1992,:-[5]Santis A D, Desmedt Y, Frankel Y, et al.. How to share a function securely. In: Proceedings of the 26th ACM Symp on Theory of Computing, Montreal, Quebec, Canada, 1994: 522- 533.[6]Gennaro R.[J].Jarecki S, Krawczyk H, et a1.. Robust and efficient sharing of RSA functions. In: Koblitz N ed., Advances in Cryptology-Crypto96 Proceedings. Lecture Notes in Computer Science 1109. Berlin, Springer-Verlag.1996,:-[7]徐秋亮. 改进门限RSA数字签名体制. 计算机学报, 2000, 23(5): 449-453.[8]Shamir A. How to share a secret[J].Communications of the ACM.1979, 22(11):612-613
|