Cited by 4
Efficient Pairing-Based Threshold Proxy Signature Scheme with Known Signers

Chao Wang, Yunpeng Han, Fagen Li
Journal:  (2009), p. 1
2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications
Minghui Zheng, Yongquan Cui, Liang Chen
Conference:  (2013), p. 683
Security Analysis of Some Threshold Signature Schemes and Multi-signature Schemes
Tianjie Cao, Dongdai Lin
Book:  Lecture Notes in Computer Science (Information Security and Cryptology) Volume 3822 (2005), p. 233
Certificateless threshold signcryption scheme with secret sharing mechanism
Huifang Yu, Shengbing Wang
Journal:  Knowledge-Based Systems Volume 221 (2021), p. 106981