参考文献
[1]Boneh D,Gentry C,Lynn B,et al.Aggregate and Verifiably Encrypted Signatures from Bilinear Maps[C]//Proceedings of EUROCRPYT’03.Berlin,Germany:Springer-Verlag,2003:416-432.
[2]Boldyreva A,Gentry C,O’Neill A,et al.Ordered Multi-signatures and Identity-based Sequential Aggregate Signatures,with Applications to Secure Routing[C]//Proceedings of the 14th ACM Conference on Computer and Communications
Security.New York,USA:ACM Press,2007:276-285.
[3]Gentry C,Ramzan Z.Identity-based Aggregate Signa-tures[C]//Proceedings of PKC’06.Berlin,Germany:Springer-Verlag,2006:257-273.
[4]Gerbush M,Lewko A,O’Neill A,et al.Dual Form Signatures:An Approach for Proving Security from Static Assumptions[C]//Proceedings of ASIACRYPT’12.Berlin,Germany:Springer-Verlag,2012:25-42.
[5]Lysyanskaya A,Micali S,Reyzin L,et al.Sequential Aggregate Signatures from Trapdoor Permutations[C]// Proceedings of Cryptology-EUROCRYPT’04.Berlin,Germany:Springer-Verlag,2004:74-90.
(下转第155页)
(上接第143页)
[6]Lu S,Ostrovsky R,Sahai A,et al.Sequential Aggregate Signatures and Multisignatures Without Random Oracles[C]//Proceedings of Cryptology-EUROCRYPT’06.Berlin,Germany:Springer-Verlag,2006:465-485.
[7]Camenisch J,Lysyanskaya A.Signature Schemes and Anonymous Credentials from Bilinear Maps[C]//Proceedings of Cryptology-CRYPTO’04.Berlin,Germany:Springer-Verlag,2004:56-72.
[8]Schrder D.How to Aggregate the CL Signature Scheme[C]//Proceedings of ESORICS’11.Berlin,Germany:Springer-Verlag,2011:298-314.
[9]Guo Nan,Cheng Jianju,Zhang Bin,et al.Aggregate Signature-based Efficient Attributes Proof with Pairing-based Anonymous Credential[C]//Proceedings of the 16th International Conference on Network-based Information Systems.Washington
D.C.,USA:IEEE Press,2013:276-281.
[10]陆海军,于秀源,谢琪.可证安全的常数长度无证书聚合签名方案[J].上海交通大学学报,2012,46(2):259-263.
[11]杜红珍,黄梅娟,温巧燕.高效的可证明安全的无证书聚合签名方案[J].电子学报,2013,41(1):72-76.
[12]Miyaji A,Nakabayashi M,Takano S.New Explicit Con-ditions of Elliptic Curve Traces for FR-reduction[J].IEICE Transactions on Fundamentals of Electronics,Communications and Computer Sciences,2001,84(5):1234-1243.
编辑金胡考 |