[1] Zhang Y,Jiguo L I,Wang Z,et al.A new efficient certificate-based signature scheme[J].Chinese Journal of Electronics,2015,24(4):776-782.
[2] Wu T Y,Tsai T T,Tseng Y M.A revocable ID-based signcryption scheme[J].Journal of Information Hiding & Multimedia Signal Processing,2011,3(3):240-251.
[3] Shamir A.Identity-based cryptosystems and signature schemes[A].Advances in Cryptology[C].Berlin:Springer-Verlag,1984.47-53.
[4] Chen Y C,Tso R,Susilo W,et al.Certificateless Signatures:Structural Extensions of Security Models and New Provably Secure Schemes[EB/OL].http://eprint.iacr.org/2013/193.pdf,2013-06-28.
[5] Tso R,Huang X,Susilo W.Strongly secure certificateless short signatures[J].Journal of Systems & Software,2012,85(6):1409-1417.
[6] Huang X,Susilo W,Mu Y,et al.On the security of certificateless signature schemes from asiacrypt 2003[A].Cryptology and Network Security[C].Berlin:Springer-Verlag,2005.13-25.
[7] Choi K Y,Park J H,Dong H L.A new provably secure certificateless short signature scheme[J].Computers & Mathematics with Applications,2011,61(7):1760-1768.
[8] Chen Y C,Tso R,Horng G.Security analysis of choi et al.'s certificateless short signature scheme[J].Journal of Information Hiding & Multimedia Signal Processing,2013,4(3):147-154.
[9] Xiong H,Guan Z,Chen Z,et al.An efficient certificateless aggregate signature with constant pairing computations[J].Information Sciences,2013,219(10):225-235.
[10] He D,Tian M,Chen J.Insecurity of an efficient certificateless aggregate signature with constant pairing computations[J].Information Sciences,2014,268(2):458-462.
[11] Zhang F,Shen L,Wu G.Notes on the security of certificateless aggregate signature schemes[J].Information Sciences,2014,287:32-37.
[12] Yu Y,Mu Y,Wang G,et al.Improved certificateless signature scheme provably secure in the standard model[J].Iet Information Security,2012,6(2):102-110.
[13] Yuan Y,Wang C.Certificateless signature scheme with security enhanced in the standard model[J].Information Processing Letters,2014,114(9):492-499.
[14] Chen Y C,Tso R,Horng G,et al.Strongly secure certificateless signature:Cryptanalysis and improvement of two schemes[J].Journal of Information Science & Engineering,2015,31(1):297-314.
[15] Fan C I,Hsu R H,Ho P H.Truly Non-repudiation certificateless short signature scheme from bilinear pairings[J].Journal of Information Science & Engineering,2011,27(27):969-982.
[16] Hung Y H,Huang S S,Tseng Y M,et al.Certificateless signature with strong unforgeability in the standard model[J].Informatica,2015,26(4):663-684. |