[1] Oded Goldreich. Secure multi-party computation(working draft, version 1.3). Weizmann Institute of Science. Rehovot, Israel, 2001[2] R Gennaro, SJarecki, H Krawczyk, T Rabin. Robust threshold DSS signatures. In: Eurocrypt’96,LNCS 1070. Berlin: Springer-Verlag, 1996.354-371[3] Ronald Cramer, Ivan Damgard, Ueli Maurer. General secure multi-party computation from any linear secret sharing scheme. In: Procceedings of Eurocrypt’2000. LNCS 1807. Berlin:Springer-Verlag, 2000. 316-334[4] 许春香, 董庆宽, 肖国镇. 矢量空间的秘密共享---多重签名方案. 电子学报, 2003, 31(1): 48-50[5] V Shoup. Practical threshold signature. In: Eurocrypt’2000, LNCS 1807,Berlin: Springer-Verlag, 2000. 207-220[6] M Michels, P Horster. On the risk of discruption in several multi-party signature schemes. In: Asiacrypt’96, LNCS 1163. Berlin:Springer-Verlag, 1996.334-345[7] GWang, S Qing, M Wang, Z Zhou. Threshold undeniable RSA signature scheme. In: Information and Communications Security, LNCS 2229.Berlin: Spring2verlag, 2001. 220-231 |