
| index | Title |
| 1 | Applying two channels to vector space secret sharing based multi-signature scheme Author(s):XIAO Qing-hua, PING Ling-di, CHEN ... Clicked:8696 Download:4153 Cited:0 <Full Text> Journal of Zhejiang University Science A 2005 Vol.6 No.1 P.56-62 DOI:10.1631/jzus.2005.A0056 |
| 2 | Colluding attacks on a group signature scheme Author(s):GUO Xing-yang, TANG Chao-jing Clicked:7787 Download:3980 Cited:0 <Full Text> Journal of Zhejiang University Science A 2005 Vol.6 No.10 P.1011-1014 DOI:10.1631/jzus.2005.A1011 |
| 3 | Verifiable threshold signature schemes against conspiracy attack Author(s):GAN Yuan-ju Clicked:6374 Download:3712 Cited:0 <Full Text> Journal of Zhejiang University Science 2004 Vol.5 No.1 P.50-54 DOI:10.1631/jzus.2004.0050 |
| 4 | A novel group signature with one time secret key Author(s):XIE Qi, YU Xiu-yuan Clicked:7504 Download:3615 Cited:0 <Full Text> Journal of Zhejiang University Science A 2005 Vol.6 No.6 P.560-564 DOI:10.1631/jzus.2005.A0560 |
| 5 | Verifier-local revocation group signatures with backward unlinkability from lattices Author(s):Yanhua ZHANG, Ximeng LIU, Yupu HU,... Clicked:9414 Download:12000 Cited:0 <Full Text> <PPT> 1307 Frontiers of Information Technology & Electronic Engineering 2022 Vol.23 No.6 P.876-892 DOI:10.1631/FITEE.2000507 |
| 6 | Anti-quantum cross-chain identity authentication approach using dynamic group signature Author(s):Huifang YU, Mengjie HUANG Clicked:2088 Download:4387 Cited:0 <Full Text> <PPT> 693 Frontiers of Information Technology & Electronic Engineering 2025 Vol.26 No.5 P.742-752 DOI:10.1631/FITEE.2400443 |