Canetti R,Goldreich O,Halevi S.The rardom oracle methodology,revisited[A].Proc of the 13th Annual ACM STOC[C].New York:ACM Press,1998.209-218.
[5]
Kenneth G Paterson,Jacob C N Schuldt.Efficient identitybesed signatures secure in the standard model[A].ACISP 2006[C].Berlin:Springer-Verlag,2006.207-222.
[6]
Feldman P.A practical scheme for non-interaclive verifiable secret sharing[A].Proc.of the 28th IEEE Symp on the Foundalions of Computer Science[C].New York:IEEE Computer Society,1987.427-437.
[7]
A Shamir.Identity-based cryptosystems and signature schemes[A].Advances in Crypto''84[C].Berlin.Springer-Verlag,1984.47-53.
[8]
Baek J,Zheng Yu-liang.Identity-based threshold signature scheme from the bilinear pairings[A].ITCC 04[C].New York:IEEE Computer Society,2004.124-128.
[9]
Chen Xiao-feng,ZHANG Fang-guo,Kwangio Kim.New IDbased threshold signature scheme from bilinear pairings[A].Progress in Indocrypt 2004[C].Berlin:Springer-Verlag,2004.371-383.
[10]
Bellare M,Boldyreva A,Palacio A.An un-instantiable random oracle model scheme for a hybrid-encryption problem[A].AdVances in Eurocrypt 2004[C].Berlin:Springer-Verlag,2004.171-188.
[11]
张乐友,胡予濮,刘振华.标准模型下基于身份的可证安全门限签名方案[J].西安电子科技大学学报(自然科学版),2008,35(1):81-86.Zhang Le-you,Hu Yu-pu,Liu Zhen-hua.Provable secure IDbased threshold signature scheme without random oracle.Journal of Xidian University,2008,35(1):81-86.(in Chiese)