The following publications are possibly variants of this publication:
- An Improved Certificateless Signature Scheme Secure in the Standard ModelHu Xiong, Zhiguang Qin, Fagen Li. FUIN, 88(1-2):193-206, 2008. [doi]
- Efficient and secure certificateless signature scheme in the standard modelLiaojun Pang, Yufei Hu, Yi Liu, Kedong Xu, Huixian Li. ijcomsys, 30(5), 2017. [doi]
- Strongly secure certificateless key-insulated signature secure in the standard modelYanan Chen, Weixiang Xu, Hu Xiong. adt, 70(9-10):395-405, 2015. [doi]
- A New Provably Secure Certificateless Signature with Revocation in the Standard ModelQian Mei, Yanan Zhao, Hu Xiong. informaticaLT, 30(4):711-728, 2019. [doi]
- Provably secure certificateless proxy signature scheme in the standard modelYang Lu, Jiguo Li. TCS, 639:42-59, 2016. [doi]
- Identity-based Threshold Signature Secure in the Standard ModelHu Xiong, Zhiguang Qin, Fagen Li. ijnsec, 10(1):75-80, 2010. [doi]
- Adaptively Secure Threshold Signature Scheme in the Standard ModelZecheng Wang, Haifeng Qian, Zhibin Li. informaticaLT, 20(4):591-612, 2009. [doi]