1, Q. B., & Yuan2, Z. ID-based threshold decryption with non-reconstruction of the private key. Editorial Department of Journal on Communications.
Chicago Style (17th ed.) Citation1, QIN Bao-shan, and ZHOU Yuan2. ID-based Threshold Decryption with Non-reconstruction of the Private Key. Editorial Department of Journal on Communications.
MLA (9th ed.) Citation1, QIN Bao-shan, and ZHOU Yuan2. ID-based Threshold Decryption with Non-reconstruction of the Private Key. Editorial Department of Journal on Communications.
Warning: These citations may not always be 100% accurate.