[1] Al-Riyami S S, Paterson K G. Certificateless Public Key Cryptography[C]//Proc. of the ASIACRYPT’03. Berlin, Germany: Springer-Verlag, 2003: 452-473. [2] Zhang Zhenfeng, Wong D S, Xu Jing, et al. Certificateless Public-key Signature: Security Model and Efficient Construction[C]//Proc. of ACNS’06. Berlin, Germany: Springer- Verlag, 2006: 293-308. [3] Huang Xinyi, Mu Yi, Susilo W, et al. Certificateless Signature Revisited[C]//Proc. of ACISP’07. Berlin, Germany: Springer- Verlag, 2007: 308-322. [4] 张玉磊, 王彩芬, 张永洁, 等. 基于双线性对的高效无证书签名方案[J]. 计算机应用, 2009, 29(5): 1330-1333. [5] 梁红梅, 黄振杰. 高效无证书签名方案的安全性分析与改进[J].计算机应用, 2010, 30(3): 685-687. [6] 黄明军, 杜伟章. 一种无证书签名方案的安全性分析及其改 进[J]. 计算机应用, 2011, 31(6): 1536-1538. [7] Wang Changji, Long Dongyang, Tang Yong. An Efficient Certificateless Signature from Pairings[J]. International Journal of Network Security, 2009, 8(1): 146-150. [8] 魏 萍, 陈海滨, 杨晓元. 一个安全无证书的盲签名方案[J]. 计算机工程与应用, 2011, 47(5): 96-97. [9] Girault M. Self-certified Public Keys[C]//Proc. of EuroCrypt’91. Berlin, Germany: Springer-Verlag, 1991: 490-497. [10] Pointcheval D, Stern J. Security Arguments for Digital Signatures and Blind Signatures[J]. Journal of Cryptology, 2000, 13(3): 361-396. [11] Rafael C, Ricardo D. Two Notes on the Security of Certificateless Signatures[C]//Proc. of ProvSec’07. Berlin, Germany: Springer- Verlag, 2007: 85-102.
|