6Wang Ching-Te,Chang Chin-Chen,Lin Chu-Hsing.Generalization of threshold signature and authenticated encryption for group communication[J].IEICE Transactions on Fundamentals of Electronics,Communications and Computer Sciences,2000,E83-A(6):1228-1237.
7Tseng Yuh-Min,Jan Jinn-Ke,Chien Hung-Yu.On the security of generalization of threshold signature and authenticated en cryption for group communication[J].IEICE Transactions on Fundamentals,2001,E84-A(10):2606-2609.
8Hsu Chien-Lung,Wu Tzong-Sun,Wu Tzong-Chen.Improve ments of generalization of threshold signature and authenticated encryption for group communication[J].Information Processing Letter,2002,81(1):41-45.
9Wang Shuhong,Wang Guilin,Bao Feng,et al.Security notes on generalization of threshold signature and authenticated encryption for group communication[J].IEICE Transactions on Fundamentals,2004,E87-A(12):3443-3446.
10Neal Koblitz,Alfred Menezes,Scott Vanstone.The state of elliptic curve cryptography[J].Designs,Codes,and Cryptography,2000,19(2-3):173-193.