D Chaum E van Heyst. Group signatures. In: Proceedings of 1991 Workshop on the Theory and Application of Cryptographic Techniques. 1991, 257– 265
2
E Bresson J Stern M Szydlo. Threshold ring signatures and applications to ad-hoc groups. In: Proceedings of the 22nd Annual International Cryptology Conference Santa Barbara. 2002, 465– 480
3
L Zhang , P Liang , Y Mu . Improving privacy-preserving and security for decentralized key-policy attributed-based encryption. IEEE Access, 2018, 6: 12736– 12745
4
T Zhou , J Shen , D He , P Vijayakumar , N Kumar . Human-in-the-loop-aided privacy-preserving scheme for smart healthcare. IEEE Transactions on Emerging Topics in Computational Intelligence, 2022, 6( 1): 6– 15