[1]Diffie W, Hellman M E. New directions in cryptography [J]. IEEE Trans on Information Theory, 1976,22(6):644-654
[2]全国信息安全标准委员会.GB/T 15843.3—2016 信息技术 安全技术 实体鉴别 第3部分:基于数字签名的机制 [S].北京:中国标准出版社,2016
[3] Harn L. Group-oriented (t, n) threshold digital signature scheme and digital multisignature[J]. IEE Proceedings-Computers and Digital Techniques, 1994, 141(5): 307–313
[4]Boneh D,Xuhua Ding,Tsudik G,et,al. A method for fast revocation of public key certificate and security capabilities[C]// Proc of the 10th USENIX Security Symp.Berkeley : USENIX Association ,2001:297-310
[5]尚铭, 马原, 林璟锵,等 SM2 椭圆曲线门限密码算法[J]. 密码学报, 2014, 1(2): 155–166
[6] Lindell Y. Fast secure two-party ECDSA signing[G]//LNCS 10402:Proc of the 37th Annual Int Cryptology Conf.Berlin:Springer, 2017:613-644
[7] RSA Laboratories.PKCS#1 v2.2: RSA Cryptography Standard [S/OL].(2012-12-27)[2019-06-25].https://www.emc.com/collateral/white-papers/h11300-pkcs-1v2-2-rsa-cryptography-standard-wp.pdf
[8] Miller V. Use of elliptic curves in cryptography [G]// LNCS 281: Proc of Conf on the Theory and Application of Cryptographic Techniques.Berlin:Springer,1985: 417-426
[9] Hankerson D, Menezes A, Vanstone S. Guide to Elliptic Curve Cryptography[M].Berlin:Springer, 2004
[10]全国信息安全标准委员会.GB/T 32918.2—2016 信息安全技术 SM2椭圆曲线公钥密码算法 第2部分:数字签名算法 [S]. 北京:中国标准出版社,2017