[1] Al-Riyami S S, Paterson K. Certificateless Public Key Crypography[C]//Proceedings of ASIACRYPT’03. Berlin, Germany: Springer-Verlag, 2003: 452-473. [2] Huang Xinyi, Susilo W, Mu Yi, et al. On the Security of Certificateless Signature Schemes from Asia Crypt’03[C]// Proceedings of CANS’05. Berlin, Germany: Springer- Verlag, 2005: 13-25. [3] Yum D H, Lee P J. Generic Construction of Certificateless Signature[C]//Proceedings of ACISP’04. Heidelberg, Germany: Springer-Verlag, 2004: 200-211. [4] Hu B C, Wong D S, Zhang Z, et al. Key Replacement Attack Against a Generic Construction of Certificateless Signature[C]//Proceedings of ACISP’06. Heidelberg, Germany: Springer-Verlag, 2006: 235-246. [5] Gorantla M C, Saxena A. An Efficient Certificateless Signature Scheme[C]//Proceedings of CIS’05. Heideberg, Germany: Springer, 2005: 110-116. [6] Cao X F, Kenneth G P, Kou W D. An Attack on a Certificateless Signature Scheme[EB/OL]. (2006-03-21). http://eprint.iacr.org/2006/367. [7] 张玉磊, 王彩芬, 张永洁, 等. 基于双线性对的高效无证书签名方案[J]. 计算机应用, 2009, 29(5): 1330-1333. [8] 梁红梅, 黄振杰. 高效无证书签名方案的安全性分析与改进[J]. 计算机应用, 2010, 30(3): 685-687. [9] 洪东招, 谢 琪. 有效的无证书签名方案[J]. 计算机应用, 2010, 30(7): 1809-1811. [10] 黄明军, 杜伟章. 一种无证书签名方案的安全性分析及其改进[J]. 计算机应用, 2011, 31(6): 1536-1538. [11] Barreto P S L M, Liter T B, McCullough N, et al. Efficient and Provably-secure Identity-based Signatures and Signcryption from Bilinear Maps[C]//Proceedings of ASIACRYPT’05. Berlin, Germany: Springer-Verlag, 2005: 515-532. [12] Rafael C, Ricardo D. Two Notes on the Security of Certificateless Signatures[C]//Proceedings of Provsec’07. Heidelberg, Germany: Springer-Verlag, 2007: 85-102. 编辑 金胡考
|