参考文献
[1]Al-Riyami S S,Paterson K.Certificateless Public Key Cryptography[C]//Proceedings of ASIACRYPT’03.Berlin,Germany:Springer-Verlag,2003:452-473.
[2]张福泰,孙银霞,张磊,等.无证书公钥密码体制研究[J].软件学报,2011,22(6):1316-1332.
[3]Huang Xinyi,Mu Yi,Willy S,et al.Certificateless Signatures:New Schemes and Security Models[J].The Computer Journal,2012,55(4):457-474.
[4]曹素珍,王彩芬,程文华,等.一种高效的无证书聚合签名方案[J].计算机工程,2011,37(18):157-159,166.
[5]杜红珍,黄梅娟,温巧燕.高效的可证明安全的无证书聚合签名方案[J].电子学报,2013,41(1):72-76.
[6]秦艳琳,吴晓平.高效的无证书有序多重签名方案[J].通信学报,2013,34(7):105-110.
[7]Du Hongzhen,Wen Qiaoyan.Certificateless Proxy Multi-signature[J].Information Sciences,2014,276:21-30.
[8]Wang Boyang,Li Baochun,Li Hui,et al.Certificateless Public Auditing for Data Integrity in the Cloud[C]//Proceedings of IEEE Conference on Communications and Network Security.Washington D.C.,USA:IEEE Press,2013:136-144.
[9]Ju Hak-Soo,Kim D Y,Lee D H,et al.Efficient Revocation of Security Capability in Certificateless Public Key Cryptography[C]//Proceedings of KES’05.Berlin,Germany:Springer-Verlag,2005:453-459.
[10]Yap W S,Sherman S M C,Heng Swee-Huay,et al.Security Mediated Certicateless Signatures[C]//Pro-ceedings of ACNS’07.Berlin,Germany:Springer-Verlag,2007:459-477.
[11]Shen Limin,Zhang Futai,Sun Yinxia.Efficient Revocable Certificateless Encryption Secure in the Standard Model[J].The Computer Journal,2014,57(4):592-601.
[12]Sun Yinxia,Zhang Futai,Shen Limin,et al.A Revocable Certificateless Signature Scheme[J].Journal of Com-puters,2014,9(8):1843-1850.
编辑刘冰 |