[1]Shamir A. Identity-based Cryptosystems and Signature Sche- mes[C]//Proc. of Crypto’84. Berlin, Germany: Springer-Verlag, 1984. [2]Al-Riyami S S, Paterson K G. Certificateless Public Key Cryptography[C]//Proc. of AsiaCrypt’03. Berlin, Germany: Springer-Verlag, 2003. [3]Huang Xinyi, Susilo W, Mu Yi, et al. On the Security of Certificateless Signature Schemes from AsiaCrypt2003[C]//Proc. of CANS’05. Berlin, Germany: Springer-Verlag, 2005. [4]Yum D H, Lee P J. Generic Construction of Certificateless Signature[C]//Proc. of ACISP’04. Sydney, Australia: [s. n.], 2004. [5]Hu B C, Wong D S, Zhang Zhenfeng, et al. Key Replacement Attack Against a Generic Construction of Certificateless Signature[C]//Proc. of ACISP’06. Melbourne, Australia: [s. n.], 2006. [6]Gorantla M C, Saxena A. An Efficient Certificateless Signature Scheme[C]//Proc. of CIS’05. Xi’an, China: [s. n.], 2005. [7]Zhang Zhenfeng, Wong D. Certificateless Public-key Signature: Security Model and Efficient Construction[C]//Proc. of ACNS’06. Singapore: [s. n.], 2006. [8]Cao Xuefei, Paterson K G, Kou W D. An Attack on a Certi- ficateless Signature Scheme[C]//Proc. of EuroCrypt’06. Berlin, Germany: Springer-Verlag, 2006. [9]Choi K Y, Park J H, Hwang J Y, et al. Efficient Certificateless Signature Scheme[C]//Proc. of ACNS’07. Zhuhai, China: [s. n.], 2007. [10]Zhang Lei, Zhang Futai. New Efficient Certificateless Signature Scheme[C]//Proc. of EUC’07. Berlin, Germany: Springer-Verlag, 2007. [11]Wang Changji, Long Dongyang, Tang Yong. An Efficient Certificateless Signature from Pairing[J]. International Journal of Network Security, 2009, 8(1): 96-100. [12]张玉磊, 王彩芬, 张永洁, 等. 基于双线对的高效无证书签名方案[J]. 计算机应用, 2009, 29(5): 1330-1333. [13]苏万力, 李 晖, 张跃宇, 等. 一种有效的无证书签名方案[J]. 江苏大学学报, 2009, 30(4): 401-404. [14]Castro R, Dahab R. Two Notes on the Security of Certificateless Signatures[C]//Proc. of ProvSec’07. Berlin, Germany: Springer- Verlag, 2007.
|