The following publications are possibly variants of this publication:
- Efficient identity-based threshold signature scheme from bilinear pairings in the standard modelWei Gao, Guilin Wang, Xueli Wang, Kefei Chen. iacr, 2012:73, 2012. [doi]
- Efficient identity-based threshold decryption scheme from bilinear pairingsWei Gao, Guilin Wang, Kefei Chen, Xueli Wang. fcsc, 12(1):177-189, 2018. [doi]
- Efficient identity-based threshold decryption scheme from bilinear pairingsWei Gao, Guilin Wang, Kefei Chen, Xueli Wang, Guoyan Zhang. iacr, 2012:75, 2012. [doi]
- New ID-Based Threshold Signature Scheme from Bilinear PairingsXiaofeng Chen, Fangguo Zhang, Divyan M. Konidala, Kwangjo Kim. indocrypt 2004: 371-383 [doi]
- One-Round ID-Based Threshold Signature Scheme from Bilinear PairingsWei Gao, Guilin Wang, Xueli Wang, Zhenguang Yang. informaticaLT, 20(4):461-476, 2009. [doi]
- An efficient identity-based blind signature scheme without bilinear pairingsDebiao He, Jianhua Chen, Rui Zhang. cee, 37(4):444-450, 2011. [doi]
- An Identity-based Mediated Signature Scheme from Bilinear PairingXiangguo Cheng, Lifeng Guo, Xinmei Wang. ijnsec, 2(1):29-33, 2006. [doi]
- Efficient Schnorr Type Identity-Based Blind Signatures from Bilinear PairingsZhenjie Huang, Qunshan Chen, Rufen Huang, Xuanzhi Lin. csie 2009: 130-134 [doi]