Cited by 3
Efficient Pairing-Based Threshold Proxy Signature Scheme with Known Signers

Chao Wang, Yunpeng Han, Fagen Li
Journal:  (2009), p. 1
Security Analysis of Some Threshold Signature Schemes and Multi-signature Schemes
Tianjie Cao, Dongdai Lin
Book:  Lecture Notes in Computer Science (Information Security and Cryptology) Volume 3822 (2005), p. 233
Certificateless threshold signcryption scheme with secret sharing mechanism
Huifang Yu, Shengbing Wang
Journal:  Knowledge-Based Systems Volume 221 (2021), p. 106981