参考文献
[1]Quisquater J J,de Soete M.Speeding up Smart Card RSA Computations with Insecure Coprocessors[C]//Proceedings of the 2nd International Smart Card Conference.North Holland:[s.n.],1991:191-197.
[2]Girault M,Lefranc D.Server-aided Verification:Theory and Practice[M].Berlin,Germany:Springer,2005.
[3]Wu Wei,Yi Mu,Willy S,et al.Server-aided Verification Signatures:Definitions and New Constructions[C]//Proceeding of ProvSec’08.Shanghai,China:[s.n.],2008:141-155.
[4]Wu Wei,Yi Mu,Willy S,et al.Provably Secure Server-aided Verification Signatures[J].Computers & Mathematics with Applications,2011,61(7):1705-1723.
[5]Wang Zhiwei,Wang Licheng,Yang Yixian,et al.Comment on Wu et al.′s Server-aided Verification Signature Schemes[J].International Journal of Network Security,2010,10(2):158-160.
[6]Lin Qun.A Provably Secure Server-aided Verification Signature[C]//Proceedings of 2013 EIDWT’13,Xi’an,China:[s.n],2013:340-343.
[7]Wu Huai,Xu Chunxiang,Deng Jiang.Server–aided Aggregate Verification Signature:Security Definition and Construction[J].International Journal of Information and Communication Technology,2015,7(2):278-286.
[8]Xu Lingling,Li,Jin,Tang Shaohua,et al.Server-aided Verification Signature with Privacy for Mobile Com-puting[J].Mobile Information Systems,2015,2015(1):1-11.
[9]Zhang Jianhong,Sun Zhibin.An ID-Based Server-aided Veri-fication Short Signature Scheme Avoid Key Escrow[J].Journal of Information Science and Engineering,2013,29(3):459-473.
[10]Wang Zhiwei,Xie Ruirui,Wang Shaohui.Attribute-based Server-aided Verification Signature[J].Applied Mathematics & Information Sciences,2014,8(6):3183-3190.
[11]Wang Zhiwei,Lv Wei.Server-aided Verification Proxy Re-signature[C]//Proceedings of Trust,Security and Privacy in Computing and Communications.Melbourne,Australia:[s.n.],2013:1704-1707.
[12]Wu Huai,Xu Chunxiang,Deng Jiang.A Server-aided Aggregate Verification Signature Scheme from Bilinear Pairing[C]//Proceedings of INCS’13.Xi’an,China:[s.n.],2013:503-506.
[13]牛淑芬,王彩芬,蓝才会.抵抗共谋攻击的服务器辅助验证签名方案[J].计算机应用研究,2015,33(7):1-4.
[14]Boneh D,Gentry C,Lynn B,et al.Aggregate and Verifiably Encrypted Signatures from Bilinear Maps[C]//Proceedings of Cryptology-Eurocrypt’03.Warsaw,Poland:[s.n.],2003:416-432.
[15]冯泽宇,巩博儒,赵运磊.基于离散对数的数字签名标准对比研究[J].计算机工程,2016,42(1):145-149.
编辑索书志 |