参考文献/References:
[1] DESMEDT Y, FRANKEL Y. Shared generation ofanthentication [A]. 1991.457-469.
[2] WANG C T, CHANG C C, LIN C H. Generalization of threshold signature and authenticated encrytion for group communications [J]. IEICE Transactions on Fundamentals, 2000(6):1228-1237.
[3] HSU C L, WU T S, WU T C. Improvments of threshold signature and authti cated encryption for group communication [J]. Iform Process Letter, 2002(1):41-45.
[4] CHANG T Y, YANG C C, HWANG M S. Athreshold signature scheme for group communications without a shared distribution center [J]. Future Generation Computer Systems, 2004, (6):1013-1021.doi:10.1016/j.future.2003.09.005.
[5] SUN H M. An efficient nonrepudiable threshold proxy signature scheme with known signers [J]. Comput Communications, 1999, (8):717-722.doi:10.1016/S0140-3664(99)00029-8.
[6] HWANG M S, LIN L C, ERIC J L. Asecure nonrepudiable threshold proxy signature scheme with known signers [J]. Informatica, 2000(2):137-144.
[7] HWANG S L, CHEN C C. Cryptanalysis of nonrepudiable threshold proxy signature with known signers [J]. Information Security Conference, 2002.243-246.
[8] HWANG S J, CHEN C C. New multi-proxy multi-signature schemes [J]. Applied Mathematics and Computation, 2004, (1):57-67.doi:10.1016/S0096-3003(02)00650-1.
[9] TZENG S F, YANG C Y, HWANG M S. A nonrepudiable threshold multi-proxy multi-signature scheme with shared verification [J]. Future Generation Computer Systems, 2004, (5):887-893.doi:10.1016/j.future.2004.01.002.
[10] HWANG S J, CHEN C C. New threshold-proxy threshold-signature schemes [J]. Computer and Electrical Engineering, 2005.69-80.
[11] HSU C L, WU T S, HE W H. New proxy multi-signature scheme [J]. Applied Mathematics and Computation, 2005, (3):1201-1206.doi:10.1016/j.amc.2004.03.001.
[12] HSU C L, WU T S, WU T C. New nonrepudiable threshold proxy signature scheme with known singers [J]. Journal of Systems and Software, 2001.119-124.
[13] TZENG S F, HWANG M S, YANG C Y. An improvement of nonrepudiable threshold proxy signature scheme with known signers [J]. Computers and Security, 2004, (2):174-178.doi:10.1016/j.cose.2003.12.001.
[14] YANG C Y, TZENG S F, HWANG M S. On the efficiency of nonrepudiable threshold proxy signature scheme with known signers [J]. Journal of SYSTEMS AND SOFTWARE, 2004, (3):507-514.doi:10.1016/j.jss.2003.09.022.