参考文献
[1] Rivest R L, Shamir A, Tauman Y. How to Leak a Secret[C]// Proc. of the 7th International Conference on the Theory and Application of Cryptology and Information Security. London, UK: [s. n.], 2001.
[2] Shamir A. Identity-based Cryptosystems and Signature Sch- emes[C]//Proc. of CRYPTO’84. Santa Barbara, USA: [s. n.], 1985.
[3] Boneh D, Franklin M. Identity Based Encryption from the Weil Pairing[C]//Proc. of CRYPTO’01. Santa Barbara, USA: [s. n.], 2001.
[4] Cocks C. An Identity Based Encryption Scheme Based on Quadratic Residues[C]//Proc. of the 8th IMA International Conference on Cryptography and Coding Cryptography and Coding. Berlin, Germany: Springer-Verlag, 2001.
[5] 柴震川, 董晓蕾, 曹珍富. 利用二次剩余构造基于身份的数字签名方案[J]. 中国科学F辑: 信息科学, 2009, 39(2): 199-204.
[6] Zhang Fangguo, Kim K. ID-based Blind Signature and Ring Signature from Pairings[C]//Proc. of ASIACRYPT’02. Berlin, Germany: Springer-Verlag, 2002.
[7] Lin Chih-Yin, Wu Tzong-Chen. An Identity-based Ring Signature Scheme from Bilinear Pairings[EB/OL]. (2003- 08-10). http://eprint.iacr.org/2003/117.
[8] Awasthi A, Lai S. ID-based Ring Signature and Proxy Ring Signature Schemes from Bilinear Pairings[EB/OL]. (2004- 04-21). http://eprint.iacr.org/2004/184.
[9] Javier H, Saez G. New Identity-based Ring Signature Schemes[C]//Proc. of ICICS’04. Berlin, Germany: Springer- Verlag.
[10] Chow S S M, Yiu S, Hui L C K. Efficient Identity Based Ring Signature[C]//Proc. of ACNS’05. Berlin, Germany: Springer-Verlag, 2005.
[11] Nguyen L. Accumulators from Bilinear Pairings and App- lications to ID-based Ring Signatures and Group Membership Revocation[C]//Proc. of CT-RSA’05. Berlin, Germany: Springer-Verlag, 2005.
[12] Hu Xiong, Qin Zhiguang, Li Fagen. Identity-based Ring Signature Scheme Based on Quadratic Residues[J]. High Technology Letters, 2009, 15(1): 94-100.
[13] Willliams H C. An M3 Public-key Encryption Scheme[C]// Proc. of Crypto’85. Berlin, Germany: Springer-Verlag, 1985.
[14] Damg I B, Frandsen G S. Efficient Algorithms for GCD and Cubic Residuosity in the Ring of Eisenstein Integers[J]. Journal of Symbolic Computation, 2005, 39(6): 643-652.
[15] 柯 召, 孙 琦. 数论讲义[M]. 2版. 北京: 高等教育出版社, 2001.
[16] Pointcheval D, Stern J. Security Arguments for Digital Signatures and Blind Signatures[J]. Journal of Cryptology, 2000, 13(3): 361-369.
[17] Herranz J, Saez G. Forking Lemmas for Ring Signature Schemes[C]//Proc. of INDOCRYPT’03. Berlin, Germany: Springer-Verlag, 2003.
[18] Barreto S L M, Lynn B, Scott M. On the Selection of Pairing-friendly Groups[C]//Proc. of SAC’04. Berlin, Germany: Springer-Verlag, 2004.
编辑 金胡考 |