[1]RIVEST R L,SHAMIR A,TAUMAN Y.How to leak a secret[C]//Proceedings of International Conference on Theory and Application of Cryptology and Information Security.Berlin,Germany:Springer,2001:552-565.
[2]GRITTI C,SUSILO W,PLANTARD T.Logarithmic size ring signatures without random oracles[J].IET Information Security,2015,10(1):1-7.
[3]LI J,WANG Y.Universal designated verifier ring signature(proof) without random oracles[C]//Proceedings of 2006 International Conference on Emerging Directions in Embedded and Ubiquitous Computing.Berlin,Germany:Springer,2006:332-341.
(下转第153页)
(上接第147页)
[4]AMIT K,SUNDER L.ID-based ring signature and proxy ring signature schemes from bilinear pairings[J].International Journal of Network Security,2007,4(2):187-192.
[5]王化群,秦波.一些环签名及其扩展签名方案的安全性分析及改进[J].计算机学报,2012,35(5):1052-1058.
[6]王晓兰.基于多变量公钥密码体制的环签名方案[J].河南科学,2013(3):318-321.
[7]MELCHOR C A,BETTAIEB S,BOYEN X,et al.Adapting Lyubashevsky’s signature schemes to the ring signature setting[C]//Proceedings of International Conference on Cryptology in Africa.Berlin,Germany:Springer,2013:1-25.
[8]NOH G,CHUN J Y,JEONG I R.Strongly unforgeable ring signature scheme from lattices in the standard model[J].Journal of Applied Mathematics,2014(5):1-12.
[9]LIU M,HAN Y,YANG X.A ring signature based on LDGM codes[M]//CHEN W G,YIN G S,ZHAO G S.Big data technology and applications.Berlin,Germany:Springer,2015.
[10]LIU J K,WEI V K,WONG D S.Linkable spontaneous anonymous group signature for Ad Hoc groups[J].Lecture Notes in Computer Science,2004(6):325-335.
[11]FUJISAKI E.Sub-linear size traceable ring signatures without random oracles[M]//LAI J,DENG R H,LIU S,et al.Topics in cryptology-CT-RSA 2011.Berlin,Germany:Springer,2011:393-415.
[12]YUEN T H,LIU J K,AU M H,et al.Efficient linkable and/or threshold ring signature without random oracles[J].Computer Journal,2013,56(4):407-421.
[13]LIU J K,MAN H A,SUSILO W,et al.Linkable ring signature with unconditional anonymity[J].IEEE Transactions on Knowledge and Data Engineering,2013,26(1):157-165.
[14]FENG Q,SUN Y L,LIU L,et al.Voting systems with trust mechanisms in cyberspace:vulnerabilities and defenses[J].IEEE Transactions on Knowledge and Data Engineering,2010,22(12):1766-1780.
[15]李伟,唐明伟,范明钰.标准模型下基于线性对的选择关联可转换环签名方案[J].西华大学学报(自然科学版),2013,32(2):1-4.
[16]张文芳,熊丹,王小敏,等.基于RSA公钥密码体制的可选择可转换关联环签名[J].计算机学报,2017,40(5):1168-1180. |