[1] CHAUM D.Blind signatures for untraceable payments[C]//Proceedings of Cryptology'83.Berlin,Germany:Springer,1983:199-203. [2] SONG Chengyuan,ZHANG Chuanrong,CAO Shuai.Blind signature scheme and its application in electronic voting protocol[J].Computer Engineering,2012,38(6):139-141,144.(in Chinese)宋程远,张串绒,曹帅.一种盲签名方案及其在电子投票协议中的应用[J].计算机工程,2012,38(6):139-141,144. [3] KUMAR M,KATTI C P,SAXENA P C.An untraceable identity-based blind signature scheme without pairing for e-cash payment system[C]//Proceedings of International Conference on Ubiquitous Communications and Network Computing.Berlin,Germany:Springer,2017:67-78. [4] BONEH D,LYNN B,SHACHAM H.Short signatures from the Weil pairing[C]//Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security.Berlin,Germany:Springer,2001:514-532. [5] WEI Chunyan,CAI Xiaoqiu.Efficient certificateless short signature scheme under standard model[J].Computer Engineering,2012,38(13):119-121.(in Chinese)魏春艳,蔡晓秋.标准模型下的高效无证书短签名方案[J].计算机工程,2012,38(13):119-121. [6] BAO Sigang,GU Haihua.Fault attack on BLS short signature[J].Computer Engineering,2014,40(8):112-115.(in Chinese)包斯刚,顾海华.针对BLS短签名的故障攻击[J].计算机工程,2014,40(8):112-115. [7] TSAI J L.A new efficient certificateless short signature scheme using bilinear pairings[J].IEEE Systems Journal,2015,11(4):2395-2402. [8] KARATI A,BISWAS G P.Cryptanalysis and improvement of a certificateless short signature scheme using bilinear pairing[C]//Proceedings of International Conference on Advances in Information Communication Technology and Computing.New York,USA:ACM Press,2016. [9] LIN Chen,SHEN Zhidong,CHEN Qian,et al.A data integrity verification scheme in mobile cloud computing[J].Journal of Network and Computer Applications,2017,77:146-151. [10] VERMA G K,SINGH B B.Efficient identity-based blind message recovery signature scheme from pairings[J].IET Information Security,2017,12(2):150-156. [11] Certicome Corporation.SEC 2:recommended elliptic curve domain parameters[EB/OL].[2018-10-12].https://perso.univ-rennes1.fr/sylvain.duquesne/master/standards/sec2_final.pdf. [12] ZHANG Fangguo,KIM K.ID-based blind signature and ring signature from pairings[C]//Proceedings of International Conference on Theory and Application of Cryptology and Information Security.Berlin,Germany:Springer,2002:533-547. [13] ZHANG Lei,ZHANG Futai.Certificateless signature and blind signature[J].Journal of Electronics(China),2008,25(5):629-635. [14] XU Guosheng,XU Guoai.An ID-based blind signature from bilinear pairing with unlinkability[C]//Proceedings of the 3rd International Conference on Consumer Electronics,Communications and Networks.Washington D.C.,USA:IEEE Press,2013:101-104. [15] VERMA G K,SINGH B B.Efficient message recovery proxy blind signature scheme from pairings[J].Transactions on Emerging Telecommunications Technologies,2017,28(9). [16] BONEH D,FRANKLIN M.Identity-based encryption from the Weil pairing[C]//Proceedings of Cryptology'01.Berlin,Germany:Springer,2001:213-229. [17] ZUO Liming,CHEN Zuosong,XIA Pingping,et al.Efficient and provably secure short proxy signature scheme[J].Journal of Computer Applications,2018,38(12):2529-2533.(in Chinese)左黎明,陈祚松,夏萍萍,等.一个高效的可证安全短代理签名方案[J].计算机应用,2018,38(12):2529-2533. [18] ZUO Liming,HU Kaiyu,ZHANG Mengli,et al.A short identity-based signature scheme with bilateral security[J].Netinfo Security,2018(7):47-54.(in Chinese)左黎明,胡凯雨,张梦丽,等.一种具有双向安全性的基于身份的短签名方案[J].信息网络安全,2018(7):47-54. |