ITAKURA K,NAKAMURA K.A public key cryptosystem suitable for digital multisignatures[J].NEC Research andDevelopment,1983,71:1-8.
[2]
BOYD C.Digital Multisignatures[C]∥Cryptography and Coding.Oxford:Oxford University Press,1989:241-246.
[3]
OKAMOTO T.A digital multisignature scheme using bijective public-key cryptosystems[J].ACMTrans Comput Syst,1988,6(4):432-441.
[4]
MICALI S,OHTA K,REYZIN L.Accountable-subgroup multisignatures[C]∥Proceedings of the 8th ACM conference onComputer and Communications Security(ACM CCS 2001),New York:ACM Press,2001:245-254.
[5]
RISTENPARTT,YILEKS.The power of proofs-of-possession:Securing multiparty signatures against rogue-key attacks[C]∥Advances in Cryptology-EUROCRYPT2007,LNCS 4515,Heidelberg:Springer,2007:228-245.
[6]
BELLARE M,NEVEN G.Multi-signatures in the plain public-key model and a general forking lemma[C]∥Proceedings ofthe 13th ACM conference on Computer and communications security(ACMCCS 2006),NewYork:ACMPress,2006:390-399.
[7]
LIN S,WANG B,LI Z J.Digital multisignature on the generalized conic curve over Zn[J].Computers&Security,2009,28(1-2):100-104.
[8]
张明志.用圆锥曲线分解整数[J].四川大学:自然科学版,1996,33(4):356-359.ZHANG Ming-zhi.Factoring Integers with Conics[J].Journal of Sichuan University:Natural Science Edition,1996,33(4):356-359.(in Chinese)
[9]
曹珍富.基于有限域Fp上圆锥曲线的公钥密码系统[C]∥密码学进展—Chinacypt’98,北京:科学出版社,1998:45-49.CAO Zhen-fu.A public key cryptosystem based on a conic over finite fields[C]∥Advances in cryptology-CHINACRYPT’98,Beijing:Sci.Press,1998:45-49.(in Chinese)
[10]
BELLARE M,NEVENG.Identity-Based Multi-signatures from RSA[C]∥Topics in Cryptology-CT-RSA2007,LNCS4377,Heidelberg:Springer,2007:145-162.
[11]
HARN L,REN J,LIN C L.Efficient identity-based GQ multisignatures[J].International Journal of Information Security,2009,8(3):205-210.