参考文献
[1]Shamir A.Identity-based Cryptosystems and Signature Schemes[C]//Proceedings of CRYPTO’84.Berlin,Germany:Springer,1984:47-53.
[2]Malone L J.Identity Based Signcryption[EB/OL].(2015-10-21).http://www.signcryption.org/publications/pdffiles/MaloneLee- eprint2002-098.pdf.
[3]Ferraiolo D F,Sandhu R,Gavrila S,et al.Proposed NIST Standard for Role-based Access Control[J].ACM Transactions on Information and System Security,2001,4(3):224-274.
[4]Zhang Jianhong,Sun Zhibin.An ID-based Server-aided Verification Short Signature Scheme Avoid Key Escrow[J].Journal of Information Science and Eng-ineering,2013,29(3):549-473.
[5]Wang Zhiwei,Xie Ruirui,Wang Shaohui.Attribute-based Server-aided Verification Signature[J].Applied Mathematics & Information Sciences,2014,8(6):3183-3190.
[6]Quisquater J J,de Soete M.Speeding up Smart Card RSA Computations with Insecure Coprocessors[C]//Proceedings of the 2nd International Smart Card Conference.Amsterdam,the Netherlands:North-holland,2000:191-197.
[7]Lim C H,Lee P J.Security and Performance of Server-aided RSA Computation Protocols[C]//Proceedings of Crypto’95.New York,USA:ACM Press,1995:70-83.
[8]Girault M,Lefranc D.Server-aided Verification:Theory and Practice[C]//Proceedings of Crypto’05.Berlin,Germany:Springer,2005:605-623.
[9]Liu Zhusong,Yan Hongyang,Li Zhike.Server-aided Anonymous Attribute-based Authentication in Cloud Computing[J].Future Generation Computer Systems,2015,52:61-66.
[10]Xu Lingling,Li Jin,Tang Shaohua,et al.Server-aided Verification Signature with Privacy for Mobile Computing[C]//Proceedings of the 4th International Conference on Emerging Intelligent Data and Web Technologies.Washington
D.C.,USA:IEEE Press,2015:1-11.
[11]Guo Fuchun,Mu Yi,Susilo W,et al.Server-aided Signature Verification for Lightweight Devices[J].Computer Journal,2014,57(4):481-493.
[12]王彩芬,王筱娟,郝占军.基于身份的新签密方案[J].计算机应用研究,2010,27(12):4630-4637.
[13]王大星,滕济凯.一种高效的基于身份的签密方案[J].微电子学与计算机,2010,27(7):57-59.
[14]李发根,胡予濮,李刚.一个高效的基于身份的签密方案[J].计算机学报,2006,29(9):1641-1647.
[15]庞辽军,高璐,裴庆祺,等.基于身份公平的匿名多接收者签密方案[J].通信学报,2013,34(8):161-168.
编辑顾逸斐 |