Computer Science ›› 2017, Vol. 44 ›› Issue (8): 168-175.doi: 10.11896/j.issn.1002-137X.2017.08.030
Previous Articles Next Articles
HU Xiao-ming, MA Chuang, SI Tao-zhi, JIANG Wen-rong, XU Hua-jie and TAN Wen-an
[1] SHAMIR A.Identity-Based cryptosystems and signature sche-mes[J].Workshop on the Theory & Application of Cryptographic Tecnhniques,1984,21(2):47-53. [2] AL-RIYAMI S S,PATERSON K G.Certificateless public key cryptography[J].Lecture Notes in Computer Science,2003,3(2):452-473. [3] ZHANG L,ZHANG F T.A Method to Construct a Class ofCertificateless Signature Schemes[J].Chinese J ournal of Computers,2009,32(5):940-945.(in Chinese) 张磊,张福泰.一类无证书签名方案的构造方法[J].计算机学报,2009,32(5):940-945. [4] CHEN H,ZHU C J,SONG R S.Efficient Certificateless Signature and Group Signature Schemes[J].Journal of Computer Research and Development,2010,47(2):231-237.(in Chinese) 陈虎,朱昌杰,宋如顺.高效的无证书签名和群签名方案[J].计算机研究与发展,2010,47(2):231-237. [5] DU H Z,WEN Q Y.Certificateless proxy multi-signature[J].Information Sciences,2014,276(c):21-30. [6] BONEH D,GENTRY C,LYNN B,SHACHAM H.Aggregate and verifiably encrypted signatures from bilinear maps[J].Lecture Notes in Computer Science,2003,6(1):416-432. [7] ZHANG L,ZHANG F T.A new certificateless aggregate signature scheme[J].Computer Communications,2009,32(6):1079-1085. [8] DU H Z,HUANG M J,WEN Q Y.Efficient and provably-secure certificateless aggregate signature scheme[J].Acta Electronica Sinica,2013,1(1):72-76.(in Chinese) 杜红珍,黄梅娟,温巧燕.高效的可证明安全的无证书聚合签名方案[J].电子学报,2013,1(1):72-76. [9] CHEN M.Improved certificateless aggregate signature with con-stant length[J].Application Research of Computers,2016(1):271-275.(in Chinese) 陈明.改进的签名长度固定的无证书聚合签名方案[J].计算机应用研究,2016(1):271-275. [10] ZHOU M,ZHANG M W,WAN C Z, et al.CCLAS:A Practical and Compact Certificateless Aggregate Signature with Share Extraction[J].International Journal of Network Security,2014,16(3):174-181. [11] CHEN H,WEI S M,ZHU C J,et al.Secure Certificateless Aggregate Signature Scheme[J].Journal of Software,2015,6(5):1173-1180.(in Chinese) 陈虎,魏仕民,朱昌杰,等.安全的无证书聚合签名方案[J].软件学报,2015,6(5):1173-1180. [12] ZHOU Y W,YANG B,ZHANG W Z.Efficient and Provide Security Certificateless Aggregate Signature Scheme[J].Journal of Software,2015,26(12):3204-3214.(in Chinese) 周彦伟,杨波,张文政.高效可证安全的无证书聚合签名方案[J].软件学报,2015,26(12):3204-3214. [13] ZHANG Y L,ZHOU D R,LI C Y,et al.Certificateless-based efficient aggregate signature scheme with universal designated verifier[J].Journal on Communications,2015,36(2):1-8.(in Chinese) 张玉磊,周冬瑞,李臣意,等.高效的无证书广义指定验证者聚合签名方案[J].通信学报,2015,36(2):1-8. [14] DU H Z.Attacks on a Certificateless Aggregate SignatureScheme with Universal Designated Verifier[J].Henan Science,2015,33(7):1087-1090.(in Chinese) 杜红珍.无证书广义指定验证者聚合签名方案的攻击[J].河南科学,2015,33(7):1087-1090. [15] QIN Y L,WU X P.Efficient certificateless sequential multi-signature scheme[J].Journal on Communications,2013,34(7):105-110.(in Chinese) 秦艳琳,吴晓平.高效的无证书有序多重签名方案[J].通信学报,2013,34(7):105-110. [16] LIU E G,WANG X,ZHOU H J,et al.Improved Certificateless Proxy Blind Signature Scheme[J].Computer Science,2016,3(8):92-94.(in Chinese) 刘二根,王霞,周华静,等.改进的无证书代理盲签名方案[J].计算机科学,2016,3(8):92-94. [17] POINTEHEVAL D,STERN J.Security arguments for digital signatures and blind signatures[J].Journal of Cryptology,2000,13(3):361-396. |
No related articles found! |
|