
| index | Title |
| 1 | Colluding attacks on a group signature scheme Author(s):GUO Xing-yang, TANG Chao-jing Clicked:7746 Download:3972 Cited:0 <Full Text> Journal of Zhejiang University Science A 2005 Vol.6 No.10 P.1011-1014 DOI:10.1631/jzus.2005.A1011 |
| 2 | Verifiable threshold signature schemes against conspiracy attack Author(s):GAN Yuan-ju Clicked:6348 Download:3706 Cited:0 <Full Text> Journal of Zhejiang University Science 2004 Vol.5 No.1 P.50-54 DOI:10.1631/jzus.2004.0050 |
| 3 | A novel group signature with one time secret key Author(s):XIE Qi, YU Xiu-yuan Clicked:7450 Download:3613 Cited:0 <Full Text> Journal of Zhejiang University Science A 2005 Vol.6 No.6 P.560-564 DOI:10.1631/jzus.2005.A0560 |
| 4 | Verifier-local revocation group signatures with backward unlinkability from lattices Author(s):Yanhua ZHANG, Ximeng LIU, Yupu HU,... Clicked:9363 Download:11956 Cited:0 <Full Text> <PPT> 1303 Frontiers of Information Technology & Electronic Engineering 2022 Vol.23 No.6 P.876-892 DOI:10.1631/FITEE.2000507 |
| 5 | Anti-quantum cross-chain identity authentication approach using dynamic group signature Author(s):Huifang YU, Mengjie HUANG Clicked:2029 Download:4211 Cited:0 <Full Text> <PPT> 649 Frontiers of Information Technology & Electronic Engineering 2025 Vol.26 No.5 P.742-752 DOI:10.1631/FITEE.2400443 |