|
[1]
|
Rivest, R.L., Shamir, A. and Wagner, D.A. (1996) Time-Lock Puzzles and Timed-Release Crypto.
|
|
[2]
|
Boneh, D. and Naor, M. (2000) Timed Commitments. In: Lecture Notes in Computer Science, Springer, 236-254. [Google Scholar] [CrossRef]
|
|
[3]
|
Boneh, D. and Komlo, C. (2022) Threshold Signatures with Private Accountability. In: Lecture Notes in Computer Science, Springer, 551-581. [Google Scholar] [CrossRef]
|
|
[4]
|
Shoup, V. (2000) Practical Threshold Signatures. Advances in Cryptology—EUROCRYPT 2000: International Conference on the Theory and Application of Cryptographic Techniques Bruges, Belgium, 14-18 May 2000, 207-220.
|
|
[5]
|
Desmedt, Y. and Frankel, Y. (1991) Shared Generation of Authenticators and Signatures. In: Lecture Notes in Computer Science, Springer, 457-469. [Google Scholar] [CrossRef]
|
|
[6]
|
Yu, J. and Zhang, J. (2022) Quantum (t, n) Threshold Proxy Blind Signature Scheme Based on Bell States. International Journal of Theoretical Physics, 61, Article No. 207. [Google Scholar] [CrossRef]
|
|
[7]
|
Tang, F., Xu, T., Peng, J. and Gan, N. (2024) TP-PBFT: A Scalable PBFT Based on Threshold Proxy Signature for IoT-Blockchain Applications. IEEE Internet of Things Journal, 11, 15434-15449. [Google Scholar] [CrossRef]
|
|
[8]
|
Hsu, C., Wu, T. and Wu, T. (2001) New Nonrepudiable Threshold Proxy Signature Scheme with Known Signers. Journal of Systems and Software, 58, 119-124. [Google Scholar] [CrossRef]
|
|
[9]
|
Hwang, M.S., Lu, E.J. and Lin, I.-C. (2003) A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem. IEEE Transactions on Knowledge and Data Engineering, 15, 1552-1560. [Google Scholar] [CrossRef]
|
|
[10]
|
Damgård, I.B. (1995) Practical and Provably Secure Release of a Secret and Exchange of Signatures. Journal of Cryptology, 8, 201-222. [Google Scholar] [CrossRef]
|
|
[11]
|
Garay, J.A. and Pomerance, C. (2003) Timed Fair Exchange of Standard Signatures. In: Lecture Notes in Computer Science, Springer, 190-207. [Google Scholar] [CrossRef]
|