[1] Shen L,Ma J,Liu X,et al.A secure and efficientid-based aggregate signature scheme for wireless sensor networks[J].IEEE Internet of Things Journal,2017,4(2):546-554.
[2] Kang J,Yu R,Huang X,et al.Privacy-preserved pseudonym scheme for fog computing supported Internet of vehicles[J].IEEE Transactions on Intelligent Transportation Systems,2017,99:1-11.
[3] Shamir A.Identity-based cryptosystems and signature schemes[A].Proceedings of Workshop on the Theory and Application of Cryptographic Techniques[C].Berlin,Heidelberg,Germany:Springer,1981.47-53.
[4] Al-Riyami S S,Paterson K G.Certificateless public key cryptography[A].Proceedings of International Conference on the Theory and Application of Cryptology and Information Security[C].Berlin,Heidelberg,Germany:Springer,2003.452-473.
[5] Shim K A.Anew certificateless signature scheme provably secure in the standard model[J].IEEE Systems Journal,2018,99:1-10.
[6] Jia X,He D,Liu Q,et al.An efficient provably-secure certificateless signature scheme for Internet-of-Things deployment[J].Ad Hoc Networks,2018,71:78-87.
[7] Li F,Xie D,Gao W,et al.A certificateless signature scheme and a certificateless public auditing scheme with authority trust level 3+[J].Journal of Ambient Intelligence and Humanized Computing,2017,8(1):1-10.
[8] Yum D H,Lee P J.Generic construction of certificateless signature[A].Proceedings of Australasian Conference on Information Security and Privacy[C].Berlin,Heidelberg,Germany:Springer,2004.200-211.
[9] Yap W S,Chow S S M,Heng S H,et al.Security mediated certificateless signatures[A].Proceedings of Applied Cryptography and Network Security[C].Berlin,Heidelberg,Germany:Springer,2007.459-477.
[10] Wang L,Chen K,Long Y,et al.An efficient pairing-free certificateless signature scheme for resource-limited systems[J].Science China Information Sciences,2017,60(11):119-102.
[11] Canetti R,Goldreich O,Halevi S.The random oracle methodology,revisited[J].Journal of the ACM (JACM),2004,51(4):557-594.
[12] Liu J K,Au M H,Susilo W.Self-generated-certificate public key cryptography and certificateless signature/encryption scheme in the standard model[A].Proceedings of the 2nd Symposium on Information,Computer and Communications Security[C].Berlin,Heidelberg,Germany:Springer,2007.273-283.
[13] Yuan Y,Wang C.Certificateless signature scheme with security enhanced in the standard model[J].Information Processing Letters,2014,114(9):492-499.
[14] Canard S,Trinh V C.An efficient certificateless signature scheme in the standard model[A].Proceedings of International Conference on Information Systems Security[C].Berlin,Heidelberg,Germany:Springer,2016.175-192.
[15] Boneh D,Shen E,Waters B.Strongly unforgeable signatures based on computational Diffie-Hellman[A].Proceedings of International Workshop on Public Key Cryptography[C].Berlin,Heidelberg,Germany:Springer,2006.229-240.
[16] Hung Y H,Huang S S,Tseng Y M,et al.Certificateless signature with strong unforgeability in the standard model[J].Informatica,2015,26(4):663-684.
[17] 吴涛,景晓军.一种强不可伪造无证书签名方案的密码学分析与改进[J].电子学报,2018,46(3):602-606. Wu Tao,Jing Xiao-jun.Cryptanalysis and improvement of a certificateless signature scheme with strong unforgeability[J].Acta Electronica Sinica,2018,46(3):602-606.(in Chinese) |