参考文献
[1]Shamir A.Identity-based Cryptosystems and Signature Schemes[C]//Proceedings of Advances in Cryptology-Crypto’84.Santa Barbara,USA:Springer-Verlag,1984:47-53.
[2]Boneh D,Franklin M.Identity Based Encryption from the Weil Pairing[C]//Proceedings of Advances in Cryptology-CRYPTO’01.Santa Barbara,USA:Springer-Verlag,2001:213-229.
[3]Yu Jia,Kong Fanyu,Cheng Xiangguo,et al.One Forward-secure Signature Scheme Using Bilinear Maps and Its Applications[J].Information Science,2014,279(1):60-76.
[4]Yu Jia,Kong Fanyu,Cheng Xiangguo,et al.Erratum to the Paper:Forward-secure Identity-based Public-key Encryption without Random Oracles[J].Fundamenta Informaticae,2012,114(1):103.
[5]Anderson R.Two Remarks on Public Key Cryp-tology [EB/OL].(2011-11-12).http://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-549.pdf.
[6]Bellare M,Miner S.A Forward-secure Digital Signature Scheme[C]//Proceedings of the 19th Annual International Cryptology Conference.Santa Barbara,USA:Springer-Verlag,1999:431-448.
[7]Liu Yali,Yin Xinchun,Qiu Liang.ID-based Forward Secure Signature Scheme from the Bilinear Pairings[C]//Proceedings of International Symposium on Electronic Commerce and Security.Guangzhou,China:[s.n.],2008:179-183.
[8]Ajtai M.Generating Hard Instances of Lattice Problems[C]//Proceedings of the 28th Annual ACM Symposium on the Theory of Computing.Pennsylvania,USA:[s.n.],1996:99-108.
[9]王小云,刘明洁.格密码学研究[J].密码学学报,2014,1(1):13-27.
[10]Lyubashevsky V.Lattice Signatures Without Trap-doors[C]//Proceedings of the 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques.Cambridge,UK:[s.n.],2012:738-755.
[11]Rückert M.Strongly Unforgeable Signatures and Hierarchical Identity-based Signatures from Lattices Without Random Oracles[C]//Proceedings of the International Workshop on Post-quantum Cryptography Darmstadt.[S.1.]:Springer-
Verlag,2010:215-222.
[12]Zhang Xiaojun,Xu Chunxiang,Jin Chunhua,et al.Efficient Forward Secure Identity-based Shorter Signature from Lattice[J].Computers & Electrical Engineering,2014,40(6):1963-1971.
[13]Bellare M,Neven G.Multi-signatures in the Plain Public-key Model and a General Forking Lemma[C]//Proceedings of ACM Conference on Computer and Communications Security.Alexandria,USA:ACM Press,2006:390-399.
编辑索书志 |