[1] Y. Desmedt and Y. Frankel, “Shared Generation of Authenticators and Signatures,” Proceedings of Cryptology-CRYPTO’91, Springer-Verlag, Berlin, 1991, pp. 457-469.
[2] C. M. Li, T. Hwang and N. Y. Lee, “Remark on the Threshold RSA Signature Scheme,” Stinosn D. LNCS 773: Advances in Cryptology-CRYPTO’91, Springer-Verlag, Berlin, 1994, pp. 413-420.
[3] R. Gennaro, S. Jareeki, H. Krawczyk, et a1., “Robust Threshold DSS,” BMaurer U. LNCS 1109: Advances in Cryptology-EUROCRYPT’96, Springer, Berlin, 1996, pp. 157-172.
[4] C. T. Wang and C. H. Lin, “Threshold Signature Schemes with Trace Able Signers in Group Communications,” Computer Communications, Vol. 21, No. 8, 1998, pp. 771-776. doi:10.1016/S0140-3664(98)00142-X
[5] L. Ham, “Group-Oriented (t, n) Threshold Digital Signature Scheme and Digital Multi-Signature,” IEEE Proceedings of Computers and Digital and Technique, Vol. 141, No. 5, 1994, pp. 307-313. doi:10.1049/ip-cdt:19941293
[6] F. Hess, “Efficient Identity Based Signature Schemes Based on Parings,” Proceedings of Selected Areas in Crypto-graphy. SAC’02, Springer, Berlin, 2003, pp. 310-324.
[7] X. Chen, F. Zhang and K. Kim, “A New ID Based Group Signature Scheme from Bilinear Pairings [EB/OL],” 2003. http://eprint. Iacr.org/2003/1 16.pdf.
[8] M. C. Gorantla and A. Saxena, “An Efficient Certificate-Less Signature Scheme,” Proceedings of Computational Intelligence and Security, Springer, Berlin, 2006, pp. 110-116.