参考文献
[1]Boneh D,Gentry C,Lynn B,et al.Aggregate and Verifiable Encrpted Signatures from Bilinear Maps[C]//Proceedings of the 22nd International Conference on the Theory and Applications of Cryptographic Techniques.Berlin,Germany:Springer,2003:416-432.
[2]Al-Riyami S S,Paterson K G.Certificateless Public Key Crypography[C]//Proceedings of International Conference on the Theory and Application of Cryptology and Information Security.Berlin,Germany:Springer,2003:452-474.
[3]杨涛,孔令波,胡建斌,等.聚合签名及其应用研究综述[J].计算机研究与发展,2012,49(S1):192-199.
[4]Lysyanskaya A,Micali S,Reyzin L,et al.Sequential Aggregate Signatures from Trapdoor Homomorphic Permutations[M].Berlin,Germany:Springer,2004.
[5]Herranz J.Deterministic Identity-based Signatures for Partial Aggregation[J].Computer Journal,2006,49(3):322-330.
[6]侯红霞,何业锋.高效的无证书短签名方案[J].现代电子技术,2012,35(7):117-119.
[7]Zhang Lei,Zhang Futai.A New Certificateless Aggregate Signature Scheme[J].Journal of Computer Communications,2009,32(6):1079-1085.
[8]Zhang Lei,Qin Bo,Wu Qianhong,et al.Efficient Many-to-One Authentication with Certificateless Aggregate Signatures[J].International Journal of Computer & Tele-communications Networking,2010,54(4):2482-2491.
[9]曹素珍,王彩芬,陈文华,等.一种高效的无证书聚合签名方案[J].计算机工程,2011,37(18):157-159.
[10]Xiong Hu,Guan Zhi,Chen Zhong,et al.An Efficient Certificateless Aggregate Signature Scheme with Constant Pairing Computations[J].Information Sciences,2013,219(10):225-235.
[11]He Debiao,Tian Miaomiao,Chen Jianhua.Insecurity of an Efficient Certificatless Aggregate Signature Scheme with Constant Pairing Computations[J].Information Sciences,2014,268(4):32-37.
[12]Zhang Futai,Shen Limin,Wu Ge.Notes on the Security of Certificatless Aggregate Signature Scheme[J].Information Sciences,2014,287(1):458-462.
[13]侯红霞,张雪锋,董晓丽.改进的无证书聚合签名方案[J].山东大学学报(理学版),2013,48(9):29-34.
[14]陈明.改进的签名长度固定的无证书聚合签名方案[J].计算机应用研究,2016,33(1):271-280.
[15]刘建华,赵长啸,毛可飞.高效的无证书聚合签密方案[J].计算机工程与应用,2016,52(12):131-134.
编辑顾逸斐 |