[1] RIVEST R L,SHAMIR A,TAUMAN Y.How to leak a secret[C]//Proceedings of ASIACRYPT'01.Berlin,Germany:Springer,2001:552-565. [2] DODIS Y,KIAYIAS A,NICOLOSI A,et al.Anonymous identification in Ad Hoc groups[C]//Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques.Berlin,Germany:Springer,2004:609-626. [3] TSANG P P,WEI V K.Short linkable ring signatures for e-voting,e-cash and attestation[C]//Proceedings of the 1st International Conference on Information Security Practice and Experience.Berlin,Germany:Springer,2005:48-60. [4] WANG Huaqun,WU Tao.Cryptography on the blockchain[J].Journal of Nanjing University of Posts and Telecommunications(Natural Science),2017,37(6):61-67.(in Chinese)王化群,吴涛.区块链中的密码学技术[J].南京邮电大学学报(自然科学版),2017,37(6):61-67. [5] LI Peili,XU Haixia,MA Tianjun.The application of blockchain technology in network mutual aid and user privacy protection[J].Netinfo Security,2018,18(9):66-71.(in Chinese)李佩丽,徐海霞,马添军.区块链技术在网络互助中的应用及用户隐私保护[J].信息网络安全,2018,18(9):66-71. [6] ZHANG Fan,HUANG Niannian,GAO Sheng.Privacy data authentication schemes based on Borromean ring signature[J].Journal of Cryptologic Research,2018,5(5):529-537.(in Chinese)张凡,黄念念,高胜.基于Borromean环签名的隐私数据认证方案[J].密码学报,2018,5(5):529-537. [7] REN Yanli,XU Danting,ZHANG Xinpeng,et al.Deletable blockchain based on threshold ring signature[J].Journal on Communications,2019,40(4):71-82.(in Chinese)任艳丽,徐丹婷,张新鹏,等.基于门限环签名的可删除区块链[J].通信学报,2019,40(4):71-82. [8] WILLY S,REI S,MARC G,et al.A new and efficient fail-stop signature scheme[J].The Computer Journal,2010,43(5):430-437. [9] NOBUAKI K,NAOTO Y,TAKASHI N,et al.Constructions of fail-stop signatures for multi-signer setting[C]//Proceedings of the 10th Asia Joint Conference on Information Security.Washington D.C.,USA:IEEE Press,2015:112-123. [10] CHAIN K,JONATHAN J C,YANG J F.An improved fail-stop signature scheme based on dual complexities[J].International Journal of Innovative Computing,2014,10(2):535-544. [11] YAMAKAWA T,KITAJIMA N,NISHIDE T,et al.A short fail-stop signature scheme from factoring[C]//Proceedings of International Conference on Provable Security.Berlin,Germany:Springer,2014:309-316. [12] HSU W H,CHIANG Y Y,LIN W Y,et al.Fail-stop group signature scheme[EB/OL].[2019-08-11].https://arxiv.org/abs/1809.01540. [13] LIU J K,MAN H A,SUSILO W,et al.Linkable and threshold ring signature without random oracle[J].IEEE Transactions on Knowledge and Data Engineering,2013,16(1):157-165. [14] TSANG P P,WEI V,CHAN T K,et al.Separable linkable threshold ring signatures[C]//Proceedings of the 5th International Conference on Cryptology.New York,USA:ACM Press,2004:384-398. [15] ZHANG Ruili,LI Shundong.Electronic consumption scheme based on linkable ring signature[J].Computer Engineering,2014,40(9):170-173.(in Chinese)张瑞丽,李顺东.基于可链接环签名的电子消费方案[J].计算机工程,2014,40(9):170-173. [16] AU M H,LIU J K,SUSILO W.Secure ID-based linkable and revocable-iff-linked ring signature with constant-size construction[J].Theoretical Computer Science,2013,469:1-14. [17] ZHANG Wenfang,XIONG Dan,WANG Xiaomin.Selectively linkable and convertible ring signature based on RSA public key cryptosystem[J].Chinese Journal of Computers,2017,40(5):1168-1180.(in Chinese)张文芳,熊丹,王小敏.基于RSA公钥密码体制的可选择可转换关联环签名[J].计算机学报,2017,40(5):1168-1180. [18] CAO Suzhen,SUN Han,DAI Wenjie.Selectively linkable and convertible ring signature scheme based on DLP[J].Computer Engineering,2019,45(2):144-147,153.(in Chinese)曹素珍,孙晗,戴文洁.基于DLP的可选择链接可转换环签名[J].计算机工程,2019,45(2):144-147,153. [19] CHANG S,WONG D S,MU Y.Certificateless threshold ring signature[J].Information Sciences,2009,179(20):3685-3696. [20] LIU Chunlu,YOU Lin.Linkable certificateless ring signature scheme[J].Communications Technology,2019,52(8):1967-1970.(in Chinese)刘纯璐,游林.关联的无证书环签名方案[J].通信技术,2019,52(8):1967-1970. [21] LIU J K,AU M H,SUSILO W,et al.Linkable ring signature with unconditional anonymity[J].IEEE Transactions on Knowledge and Data Engineering,2014,26(1):157-165. |