Computer Science ›› 2025, Vol. 52 ›› Issue (9): 396-404.doi: 10.11896/jsjkx.240700126
• Information Security • Previous Articles
TANG Jiayi1, HUANG Xiaofang1, WANG Licheng2, ODOOM J1
CLC Number:
[1]NAYAK P,SWAPNA G.Security issues in IoT applications using certificateless aggregate signcryption schemes:An overview[J].Internet of Things,2023,21:100641. [2]XIANG Y J,HUANG X F,XIANG K F,et al.A Blockchain Certificateless Encryption Me-chanism Based on the National Cryptography Algorithm[J].Computer Science,2024,51(8):440-446. [3]CHEN X Y,HUANG X F.Fully Constrained Revocable Signature[J].Computer Applications and Research,2021,38(6):1843-1848. [4]NING Q,JIN C,CHEN Z,et al.An Efficient HeterogeneousRing Signcryption Scheme for Wireless Body Area Networks[J].Computer Systems Science & Engineering,2023,47(2):2061-2078. [5]CAI Y,ZHANG H,FANG Y.A conditional privacy protection scheme based on ring signcryption for vehicular ad hoc networks[J].IEEE Internet of Things Journal,2020,8(1):647-656. [6]GUO H,DENG L.Certificateless Ring Signcryption Schemefrom Pairings[J].International Journal of Netw Security,2020,22(1):102-111. [7]GUO R,XU L,LI X,et al.An efficient certi-ficateless ring signcryption scheme with con-ditional privacy-preserving in VANETs[J].Journal of Systems Architecture,2022,129:102633. [8]DU H,WEN Q,ZHANG S,et al.An improved conditional privacy protection scheme based on ring signcryption for vanets[J].IEEE Internet of Things Journal,2023,10(20):17881-17892. [9]YADAV V K.Anonymous and linkable ring signcryptionscheme for location-based services in VANETs[J].Vehicular Communications,2024,45:100717. [10]TANG Y L,XIA F F,YE Q,et al.Identity-Based Linkable Ring Signature on Lattice[J].Security and Communication Networks,2021,8(2):232-247. [11]YU H,SHI J.Certificateless multi-source signcryption with lattice[J].Journal of King Saud University-Computer and Information Sciences,2022,34(10):10157-10166. [12]YU H,WANG H.Lattice-based threshold signcryption forblockchain oracle data trans-mission[J].IEEE Transactions on Intelligent Transportation Systems,2023,24(10):11057-11065. [13]YU H,BAI L.Post-quantum blind signcryp-tion scheme from lattice[J].Frontiers of Information Technology & Electronic Engineering,2021,22(6):891-901. [14]YU H,WANG W,ZHANG Q.Certificateless anti-quantum ring signcryption for network coding[J].Knowledge-Based Systems,2022,235:107655. [15]YU H,LYU Z.Lattice-based ring signcryption for consortiumblockchain[J].Journal of King Saud University-Computer and Information Sciences,2023,35(7):101602. [16]ODOOM J,HUANG X,ZHOU Z,et al.Linked or unlinked:A systematic review of linkable ring signature schemes[J].Journal of Systems Architecture,2023,134:102786. [17]XUE Y,LU X,AU M H,et al.Efficient Link-able Ring Signatures:New Framework and Post-Quantum Instantiations[C]//Computer Security-ESORICS 2024.2024:435-456. [18]HUI X,CHAU S C K.LLRing:Logarithmic Linkable Ring Signatures with Transparent Setup[C]//Computer Security-ESORICS 2024.2024:299-319. [19]LU X Y,AU M H,ZHANG Z F.Raptor:a practical lattice based (linkable) ring signature[C]//Proceedings of the International Confe-rence on Applied Cryptography and Network Security.Cham:Springer, 2019:110-130. [20]TANG Y,XIA F,YE Q,et al.Identity-based linkable ring signature on NTRU lattice[J].Security and Communication Networks,2021,2021(1):9992414. [21]YE Q,WANG M Y,MENG H,et al.Efficient Linkable Ring Signature Scheme over NTRU Lattice with Unconditional Anonymity[J].Computational Intelligence and Neuroscience,2022,2022(1):8431874. [22]ALBERTO TORRES W A,STEINFIELD R,SAKZAD A,et al.Post-quantum one-time linkable ring signature and application to ring confidential transactions in blockchain (lattice RingCT v1.0)[C]//Information Security and Privacy:23rd Australasian Conference.Cham:Springer,2018:558-576. [23]KIM B G,WONG D,YANG Y S.Quan-tum-Secure HybridBlockchain System for DID-based Verifiable Random Function with NTRU Linkable Ring Signature[J].arXiv:2401.16906,2024. [24]LYUBASHEVSKY V,PREST T.Quadratic time,linear space algorithms for Gram-Schmidt orthogonalization and Gaussian sampling in structured Lattices[C]//Proceedings of the 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques (EuroCrypt 2015).Berlin:Springer,2015:789-815. [25]LYUBASHEVSKY V.Lattice signatures without trapdoors[C]//Proceedings of the 31st Annual International Conference on Theory and Applications of Cryptographic Techniques.Berlin:Springer,2012:738-755. [26]STEHLÉ D,STEINFIELD R.Making NTRUEncrypt and NTRUSign as secure as worst-case problems over ideal lattices[C]//Advance in Cryptology-EUROCRYPT 2011.Berlin:Springer,2011:27-47. [27]CHEN Y C.SPEKS:secure server-designation public key encryption with keyword search against keyword guessing attacks[J].The Computer Journal,2015,58(4):922-933. [28]MCCARTHY S,SMYTH N,O’SULLIVAN E.A practical implementation of identity-based encryption over NTRU lattices[C]//Cryptography and Coding:16th IMA International Conference.Cham:Springer,2017:227-246. [29]WEN J M,BAI L,YANG Z C,et al.LaRRS:Lattice-based revocable ring signature and its application for VANETs[J].IEEE Transactions on Vehicular Technology,2024,73:739-753. |
[1] | WANG Shaohui, ZHAO Zhengyu, WANG Huaqun, XIAO Fu. Analysis and Improvement on Identity-based Remote Data Integrity Verification Scheme [J]. Computer Science, 2023, 50(7): 302-307. |
[2] | QIAN Xin-yuan, WU Wen-yuan. Identity-based Encryption Scheme Based on R-SIS/R-LWE [J]. Computer Science, 2021, 48(6): 315-323. |
[3] | ZUO Li-ming,CHEN Lan-lan. Special Digital Signature Scheme Based on Identity Identification and Its Application [J]. Computer Science, 2020, 47(1): 309-314. |
[4] | CHAI Lin-peng , ZHANG Bin. One-off Public Key Scheme for Preventing Dishonest Third Party Attacking [J]. Computer Science, 2018, 45(7): 139-142. |
[5] | HUO Shi-wei,ANG Wen-jing,LI Jing-zhi,SHEN Jin-shan. New Identity-based Authentication and Key Agreement Scheme in Ad hoc Networks [J]. Computer Science, 2018, 45(6A): 380-382. |
[6] | ZHANG Xiang-song and LIU Zhen-hua. Non-trapdoors Lattice Signature Scheme with Message Recovery [J]. Computer Science, 2014, 41(9): 165-168. |
[7] | SUN Ling and TIAN Yuan. Identity-based Key Management Scheme in Pervasive Computing Environments [J]. Computer Science, 2013, 40(6): 124-127. |
[8] | FU Xiao-jing,ZHANG Guo-yin,MA Chun-guang. Survey on Identity-based Key Establishment Protocols for Wireless Sensor Networks [J]. Computer Science, 2010, 37(8): 26-31. |
[9] | GUO Hua,ZHANG Fan,LI Zhou-jun,ZHOU Xiao-juan. Cryptanalysis and Improvement of a New Identity-based Key Exchange Protocol [J]. Computer Science, 2010, 37(10): 78-81. |
|