[1]Johnson D, Menezes A, Vanstone S. The elliptic curve digital signature algorithm (ECDSA)[J]. International Journal of Information Security, 2001, 1(1): 3663[2]Hankerson D.椭圆曲线密码学导论[M]. 张焕国, 译. 北京: 电子工业出版社, 2005[3]林璟锵, 荆继武. 密码应用安全的技术体系探讨[J]. 信息安全研究, 2019, 5(1): 1422[4]AlZubaidie M, Zhang Z, Zhang J. Efficient and secure ECDSA algorithm and its applications: A survey[J]. arXiv preprint, arXiv: 1902.10313, 2019[5]苏彬庭, 陈明志, 许力, 等. 国密算法在工业互联网安全中的应用研究[J]. 信息技术与网络安全, 2021, 40(3): 2831[6]曾彬, 苏亮源, 文吉刚. 国产化泛在物联网安全防护系统的设计与应用[J]. 信息技术与网络安全, 2021, 40(9): 4247[7]李峰, 陈新. 基于LTEV2X技术的PKI系统架构探讨[J]. 信息技术与网络安全, 2021, 39(7): 4551[8]Henning P J. A taxonomy of cryptocurrency enforcement actions[J]. Brooklyn Journal of Corporate, Financial and Commercial Law, 2020, 14(2): 227257[9]Lu H, Jin C, Helu X, et al. AutoD: Intelligent blockchain application unpacking based on JNI layer deception call[J]. IEEE Network, 2020, 35(99): 17[10]郭娟娟, 王琼霄, 许新, 等. 安全多方计算及其在机器学习中的应用[J]. 计算机研究与发展, 2021, 58(10): 21632186[11]Dalskov A, Orlandi C, Keller M, et al. Securing DNSSEC keys via threshold ECDSA from generic MPC[C] Proc of European Symp on Research in Computer Security. Berlin: Springer, 2020: 654673[12]Lindell Y. Fast secure twoparty ECDSA signing[C] Proc of Annual Int Cryptology Conf. Berlin: Springer, 2017: 613644[13]Lindell Y, Nof A. Fast secure multiparty ECDSA with practical distributed key generation and applications to cryptocurrency custody[C] Proc of the 2018 ACM SIGSAC Conf on Computer and Communications Security. New York: ACM, 2018: 18371854[14]Doerner J, Kondi Y, Lee E, et al. Secure twoparty threshold ECDSA from ECDSA assumptions[C] Proc of 2018 IEEE Symp on Security and Privacy. Piscataway, NJ: IEEE, 2018: 980997[15]Doerner J, Kondi Y, Lee E, et al. Threshold ECDSA from ECDSA assumptions: The multiparty case[C] Proc of 2019 IEEE Symp on Security and Privacy. Piscataway, NJ: IEEE, 2019: 10511066[16]王婧, 吴黎兵, 罗敏, 等. 安全高效的两方协同ECDSA签名方案[J]. 通信学报, 2021, 42(2): 1225[17]严莹子. (t,n)门限ECDSA签密的安全混淆方法[J]. 信息技术与信息化, 2021 (1): 3236, 39[18]龙毅宏. 一种SM2数字签名分割生成方法及系统: 中国, 106603246[P]. 20170426[19]冯琦, 何德彪, 罗敏, 等. 移动互联网环境下轻量级SM2两方协同签名[J]. 计算机研究与发展, 2020, 57(10): 21362146[20]尚铭, 马原, 林璟锵, 等. SM2椭圆曲线门限密码算法[J]. 密码学报, 2014, 1(2): 155166[21]Mu Y H, Xu H X, Li P L, et al. Secure twoparty SM9 signing[J]. Science China Information Sciences, 2020, 63(8): 189191[22]ANSI. ASC X9 X9.622005 the Public Key Cryptography for the Financial Services Industry[S]. Annapolis, MD: Accredited Standards Committee X9, Inc, 2005
|