[1] RIVEST R,SHAMIR A,TAUMAN Y.How to leak a secret[A].The 7th International Conference on the Theory and Application of Cryptology and Information Security[C].Gold Coast,Australia,2001.552-565.
[2] 张福泰,张方国,王育民.群签名及其应用[J].通信学报,2001,22(1):77-85. ZHANG Fu-tai,ZHANG Fang-guo,WANG Yu-min.Group signature and its applications[J].Journal of Communications,2001,22(1):77-85.(in Chinese)
[3] 陈泽文,张龙军,王育民,等.一种基于中国剩余定理的群签名方案[J].电子学报,2004,32(7):1062-1065. CHEN Ze-wen,ZHANG Long-jun,WANG Yu-min,et al.A group signature scheme based on Chinese remainder theorem[J].Acta Electronica Sinica,2004,32(7):1062-1065.(in Chinese)
[4] 张键红,伍前红,邹建成,等.一种高效的群签名[J].电子学报,2005,33(6):1113-1115. ZHANG Jian-hong,WU Qian-hong,ZOU Jian-cheng,et al.An efficient group signature scheme[J].Acta Electronica Sinica,2005,33(6):1113-1115.(in Chinese)
[5] 李继国,孙刚,张亦辰.标准模型下可证安全的本地验证者撤销群签名[J].电子学报,2011,39(7):1618-1623. LI Ji-guo,SUN Gang,ZHANG Yi-chen.Provably secure group signature scheme with verifier-local revocation in the standard model[J].Acta Electronica Sinica,2011,39(7):1618-1623.(in Chinese)
[6] CHOW S S M,SUSILO W,YUEN T H.Escrowed linkability of ring signtures and its applications[A].First International Conference on Cryptology in Vietnam[C].Hanoi,Vietnam,2006.175-192.
[7] 苗付友,王行甫,苗辉,等.一种支持悬赏的匿名电子举报方案[J].电子学报,2008,36(2):320-324. MIAO Fu-you,WANG Xing-Fu,MIAO Hui,et al.An anonymous E-prosecution scheme with reward support[J].Acta Electronica Sinica,2008,36(2):320-324.(in Chinese)
[8] 王化群,于红,吕显强,等.一种支持悬赏的匿名电子举报方案的安全性分析及设计[J].电子学报,2009,37(8):1826-1829. WANG Hua-qun,YU Hong,LÜ Xian-qiang,et al.Cryptanalysis and design of an anonymous E-prosecution scheme with reward support[J].Acta Electronica Sinica,2009,37(8):1826-1829.(in Chinese)
[9] YANG X,WEI W,JOSEPH K L,CHEN X F.Lightweight anonymous authentication for ad hoc group:a ring signature approach[A].International Conference on Provable Security[C].Kanazawa,Japan,2015.215-226.
[10] SHAMIR A.Identity-based cryptosystems and signature schemes[A].The Workshop on the Theory and Application of Cryptographic Techniques[C].California,USA,1984.47-53.
[11] ZHANG F G,KIM K.ID-based blind signature and ring signature from pairings[A].International Conference on the Theory and Application of Cryptology and Information Security[C].Queenstown,New Zealand,2002.533-547.
[12] AU M H,JOSPH K L,YUEN T H,et al.ID-based ring signature scheme secure in the standard model[A].International Workshop on Security[C].Kyoto,Japan,2006.1-16.
[13] 张跃宇,李晖,王育民.标准模型下基于身份的环签名方案[J].通信学报,2008,29(4):40-44. Zhang Yue-yu,LI Hui,WANG Yu-min.Identity-based ring signature scheme under standard model[J].Journal of Communications,2008,29(4):40-44.(in Chinese)
[14] 刘振华,胡予濮,牟宁波,等.新的标准模型下基于身份的环签名方案[J].电子与信息学报,2009,31(7):1727-1731. LIU Zhen-hua,HU Yu-pu,MU Ning-bo,et al.New identity-based ring signature in the standard model[J].Journal of Electronics & Information Technology,2009,31(7):1727-1731.(in Chinese)
[15] 张明武,杨波,姚金涛,等.标准模型下身份匿名签名方案分析与设计[J].通信学报,2011,32(5):40-46. ZHANG Ming-wu,YANG Bo,YAO Jin-tao,et al.Cryptanalysis and design of signature schemes with identity ambiguity in the standard model[J].Journal of Communications,2011,32(5):40-46.(in Chinese)
[16] 葛爱军,马传贵,张振峰,等.标准模型下固定长度的基于身份环签名方案[J].计算机学报,2012,35(9):1874-1880. GE Ai-jun,MA Chuan-gui,ZHANG Zhen-feng,et al.Identity-based ring signature scheme with constant size signatures in the standard model[J].Chinese Journal of Computers,2012,35(9):1874-1880.(in Chinese)
[17] WATERS B.Dual system encryption:Realizing fully secure IBE and HIBE under simple assumptions[A].Advances in Cryptology-CRYPTO[C].California,USA,2009.619-636.
[18] LEWKO A,WATERS B.New techniques for dual system encryption and fully secure HIBE with short ciphertexts[A].Theory of Cryptography Conference[C].Zurich,Switzerland,2010.455-479.
[19] LEWKO A,WATERS B.Unbounded HIBE and attribute-based encryption[A].Annual International Conference on the Theory and Applications of Cryptographic Techniques[C].Tallinn Estonia,2011.547-567.
[20] AU M H,JOSPH K L,SUSILO W,ZHOU Jian-ying.Realizing fully secure unrestricted ID-based ring signature in the standard model based on HIBE[J].IEEE Transactions on Information Forensics and Security,2013,8(12):1909-1922.
[21] BONEH D,GOH E-J,NISSIM K.Evaluating 2-DNF formulas on ciphertexts[A].Theory of Cryptography Conference[C].Cambridge,MA,USA,2005.325-341. |