Computer Science ›› 2013, Vol. 40 ›› Issue (8): 136-139.
Previous Articles Next Articles
LIU Qing-hua,SONG Yu-qing and LIU Yi
[1] Steinfeld R,Bull L.Content Extraction Signatures [C]∥Proc.of the 4th International Conference on Information Security and Cryptology.Berlin,Germany:Springer-Verlag,2001:285-304 [2] Bull L,Stanski P,Mcg S D.Content Extraction Signatures Using XML Digital Signatures and Custom Transforms On-demand[C]∥Proc.of the 12th International World Wide Web Conference.New York,USA:ACM Press,2003:170-177 [3] 梁成全,宋余庆,耿飙,等.基于ECC的病历文档内容抽取签名方案的研究[J].计算机应用研究,2010,7(7):2650-2653 [4] 蓝才会,王彩芬.基于身份的可截取签名方案[J].计算机应用,2007,7(10):2456-2458 [5] Ye Shu-ying,Ou Fu-na,Zhang Hai-ling.An ID-Based Content Extraction Signatures Without Trusted Party.Industrial Electronics and Applications(ICIEA)[C]∥2010the 5th IEEE Conference on Digital Object Identifier.2010:1801-1804 [6] 曹素珍,王彩芬,陈小云,等.一种不含双线性对的可截取签名方案[J].计算机工程,2012,8(3):110-112 [7] He D B,Chen J H,Zhang R.Efficient and provably-secure cer-tificateless signature scheme without bilinear pairings[R].Report 2010/632.Cryptology ePrint Archive,2010 [8] Al-Riyami S,Paterson K.Certificateless public key cryptography[C]∥LNCS 2894:Proceedings of Asiacrypt’03.Berlin:Sprin-ger-Verlag,2003:452-473 [9] David P,Jacque S.Security Arguments for Digital Signaturesand Blind Signatures[J].Journal of Cryptology,2000,13(3):361-396 [10] Miracl.Multiprecision integer and rational arithmetic C/C++library.http://indigo.ie/mscott/ |
No related articles found! |
|