
| index | Title |
| 1 | Applying two channels to vector space secret sharing based multi-signature scheme Author(s):XIAO Qing-hua, PING Ling-di, CHEN ... Clicked:8667 Download:4142 Cited:0 <Full Text> Journal of Zhejiang University Science A 2005 Vol.6 No.1 P.56-62 DOI:10.1631/jzus.2005.A0056 |
| 2 | Colluding attacks on a group signature scheme Author(s):GUO Xing-yang, TANG Chao-jing Clicked:7759 Download:3977 Cited:0 <Full Text> Journal of Zhejiang University Science A 2005 Vol.6 No.10 P.1011-1014 DOI:10.1631/jzus.2005.A1011 |
| 3 | Verifiable threshold signature schemes against conspiracy attack Author(s):GAN Yuan-ju Clicked:6359 Download:3709 Cited:0 <Full Text> Journal of Zhejiang University Science 2004 Vol.5 No.1 P.50-54 DOI:10.1631/jzus.2004.0050 |
| 4 | A novel group signature with one time secret key Author(s):XIE Qi, YU Xiu-yuan Clicked:7497 Download:3613 Cited:0 <Full Text> Journal of Zhejiang University Science A 2005 Vol.6 No.6 P.560-564 DOI:10.1631/jzus.2005.A0560 |
| 5 | Verifier-local revocation group signatures with backward unlinkability from lattices Author(s):Yanhua ZHANG, Ximeng LIU, Yupu HU,... Clicked:9405 Download:11973 Cited:0 <Full Text> <PPT> 1305 Frontiers of Information Technology & Electronic Engineering 2022 Vol.23 No.6 P.876-892 DOI:10.1631/FITEE.2000507 |
| 6 | Anti-quantum cross-chain identity authentication approach using dynamic group signature Author(s):Huifang YU, Mengjie HUANG Clicked:2073 Download:4302 Cited:0 <Full Text> <PPT> 682 Frontiers of Information Technology & Electronic Engineering 2025 Vol.26 No.5 P.742-752 DOI:10.1631/FITEE.2400443 |