The following publications are possibly variants of this publication:
- A threshold signature scheme based on the elliptic curve cryptosystemTzer-Shyong Chen. amc, 162(3):1119-1134, 2005. [doi]
- A practical authenticated encryption scheme based on the elliptic curve cryptosystemTzer-Shyong Chen, Kuo-Hsuan Huang, Yu-Fang Chung. csi, 26(5):461-469, 2004. [doi]
- Authenticated Encryption Schemes with Message Linkage for Threshold SignaturesChi-Hsiung Huang, Chia-Yin Lee, Chu-Hsing Lin, Chin-Chen Chang, Kuo-Lun Chen. aina 2005: 261-264 [doi]
- A Modified (t, n) Threshold Proxy Signature Scheme Based on the RSA CryptosystemWen-Chung Kuo, Ming-Yang Chen. icita 2005: 576-579 [doi]
- A Blind Signature Scheme Based on Elliptic Curve CryptosystemFuh-Gwo Jeng, Tzer-Long Chen, Tzer-Shyong Chen. ncm 2009: 2044-2049 [doi]
- A specifiable verifier group-oriented threshold signature scheme based on the elliptic curve cryptosystemTzer-Shyong Chen. csi, 27(1):33-38, 2004. [doi]
- ID-based digital signature scheme on the elliptic curve cryptosystemYu-Fang Chung, Kuo-Hsuan Huang, Feipei Lai, Tzer-Shyong Chen. csi, 29(6):601-604, 2007. [doi]
- Digital Multi-Signature Scheme Based on the Elliptic Curve CryptosystemTzer-Shyong Chen, Kuo-Hsuan Huang, Yu-Fang Chung. jcst, 19(4):570, 2004. [doi]