[1] Boneh D,Gentry C,Lynn B,et al.Aggregate and verifiably encrypted signatures from bilinear maps[A].Proceedings of Cryptology-EUROCRYPT 2003[C].Berlin:Springer-Verlag,2003.416-432.
[2] Craig G,Zulfikar R.Identity-based aggregate signatures[A].Proceedings of Public Key Cryptography 2006[C].Berlin:Springer-Verlag,2006.257-273.
[3] Kyung A S.An ID-based aggregate signature scheme with constant pairing computations[J].Journal of Systems and Software,2010,83(10):1873-1880.
[4] Al-Riyami S S,Paterson K.Certificateless public key cryptography[A].Proceedings of Cryptology-ASIACRYPT 2003[C].Berlin:Springer-Verlag,2003.452-473.
[5] Zheng G,Yu L,Xuan H,Chen K.Practical Certificateless aggregate signatures from bilinear maps[J].Journal of Information Science and Engineering,2008,26(6):2093-2106.
[6] Zhang L,Zhang F T.Security model for certificateless aggregate signature schemes[A].Proceedings of Computational Intelligence and Security 2008[C].Suzhou:IEEE,2008.2.364-368.
[7] Xiong H,Guang Z,Chen Z,Li F G.An Efficient certificateless aggregate signature with constant pairing computations[J].Information Science,2013,219(10):225-235.
[8] Chen Y,Horng G,Liu C,et al.Efficient certificateless aggregate signature scheme[J].J.Electronic Science and Technology,2012,10(3):209-214.
[9] Zhou M,Zhang M,Wang C,et al.CCLAS:A practical and compact certificateless aggregate signature with share extraction[J].International Journal of Network Security,2014,16(2):157-164.
[10] Zhang F,Shen L,Wu G.Notes on the security of certificateless aggregate signature schemes[J].Information Sciences,2014,287(10):32-37.
[11] Zhang L,Qin B,Wu Q H,Zhang F T.Novel efficient certificateless aggregate signatures[A].Proceedings of Applied Algebra,Algebraic Algorithms and Error-Correcting Codes[C].Berlin:Springer-Verlag,2009.235-238.
[12] Zhang L,Zhang F T.A new certificateless aggregate signature scheme[J].Computer Communications,2009,32(6):1079-1085.
[13] Zhang J,Mao J.An efficient RSA-based certificateless signature scheme[J].Journal of Systems and Software,2012,85(3):638-642.
[14] Chen H,Song W G,Zhao B.Certificateless aggregate signature scheme[A].Proceedings of International Conference on E-Business and E-Government[C].Guangzhou:IEEE,2010.3790-3793.
[15] Gong Z,Long Y,Hong X,Chen K F.Practical certificateless aggregate signatures from bilinear maps[J].Journal of Information Science and Engineering,2010,26(6):2093-2106.
[16] Dodis Y,Katz J,et al.Key-insulated public-key cryptosystems[A].Proceedings of Cryptology-Eyrocrypt 2002[C].Berlin:Springer-Verlag,2002.65-82.
[17] Wan Z,Lai X,Weng J,et al.Certificateless key-insulated signature without random oracles[J].Journal of Zhejiang University Science A,2009,10(2):1790-1800.
[18] Wan Z M,Lai X J,Weng J,Li J G.Certificateless strong key-insulated signature[A].Proceedings of Information Science and Technology[C].Nanjing:IEEE,2011.270-276.
[19] 寻甜甜.密钥隔离的聚合签名的研究[D].青岛:青岛大学硕士论文,2015.34-51. |