[1] Bellare M,Miner S.A forward-secure digital signature scheme[A].Proceedings of the CRYPTO 1999[C].1999.431-448.
[2] Yu J,Kong F Y,Cheng X G,et al.One forward-secure signature scheme using bilinear maps and its applications[J].Information Sciences,2014,279:60-76.
[3] Yu J,Hao R,Kong F Y,Cheng X G,et al.Forward-secure identity-based signature:security notions and construction[J].Information Sciences,2011,181(3):648-660.
[4] Dodis Y,Katz J,Xu S,et al.Strong key-insulated signature schemes[A].Proceedings of the 6th Int Workshop on Practice and Theory in Public Key Cryptography[C].Berlin:Springer,2003,130-144.
[5] 葛立荣,于佳,程相国,等.标准模型下支持多协助器的强密钥隔离签名方案[J].计算机研究与发展.2014,51(5):1081-1088. Ge L R,Yu J,Cheng X G,et al.Strong key-insulated signature scheme supporting multi-helpers in the standard model[J].Journal of Computer Research and Development,2014,51(5):1081-1088.(in Chinese)
[6] Yu J,Kong F Y,Cheng X G,Hao R,et al.Intrusion-resilient identity-based signature:security definition and construction[J].Journal of Systems and Software,2012,85(2):382-391.
[7] Hanaoka G,Hanaoka Y,Imai H.Parallel key-insulated public key encryption[A].Proceedings of Public Key Cryptography-PKC 2006[C].Berlin:Springer,2006.105-122.
[8] Weng J,Chen K F,et al.Parallel key-insulated signature framework and construction[J].Journal of Shanghai Jiaotong University,2008,13(1):6-11.
[9] Wan Z M,Lai X J,et al.Strong key-insulated signature in the standard model[J].Journal of Shanghai Jiaotong University,2010,15(6):657-661.
[10] [JP3]Chen J H,Chen K F,Yu L.Identity-based threshold key-insulated signature[J].High Technology Letters,2012,18(3):275-280.
[11] Boneh D,Gentry C,Lynn B,Shacham H.Aggregate and verifiably encrypted signatures from bilinear maps[A].Proceedings of Cryptology-Eurocrypt'03[C].Berlin:Springer,2003.416-432.
[12] Lu S,Ostrovsky R,Sahai A,Shacham H,et al.Sequential aggregate signatures and multi signatures without random oracles[A].Proceedings of Cryptology-Eurocrypt'06[C].Berlin:Springer,2006.456-485.
[13] Brogle K,Goldberg Sh,Reyzin L.Sequential aggregate signatures with lazy verification from trapdoor permutations[A].Proceedings of the 18th international conference on The Theory and Application of Cryptology and Information Security[C].Berlin:Springer,2012.644-662.
[14] 杜红珍,黄梅娟,温巧燕.高效的可证明安全的无证书聚合签名方案[J].电子学报,2013,41(1):72-76. Du H Z,Huang M J,Wen Q Y.Efficient and provably-secure certificateless aggregate signature scheme[J].Acta Electronica Sinica,2013,41(1):72-76.(in Chinese)
[15] Lu S,Ostrovsky R,Sahai A,Shacham H,et al.Sequential aggregate signatures,multisignatures,and verifiably encrypted signatures without random oracles[J].Journal of Cryptology,2013,26(2):340-373.
[16] Ma D.Practical forward secure sequential aggregate signatures[A].Proceedings of the 2008 ACM Symposium on Information,Computer and Communications Security[C].New York:ACM,2008.341-352. |