[1] SYFULLAH M,LIM J M.Data broadcasting on cloud-VANET for IEEE 802.11p and LTE hybrid VANET architectures[C]//Proceedings of the 3rd International Conference on Computational Intelligence and Communica-tion Technology.Ghaziabad,India:[s.n.],2017:165-176. [2] ALRIYAMI S S,PATERSON K G.Certificateless public key cryptography[C]//Proceedings of International Conference on Theory and Application of Cryptology and Information Security.Washington D.C.,USA:USA:IEEE Press,2003:452-473. [3] SHAMIR A.Identity-based cryptosystems and signature schemes[C]//Proceedings of Workshop on Theory and Application of Cryptographic Techniques.Berlin,Germany:Springer,1985:47-53. [4] BONEH D,GENTRY C,LYNN B,et al.Aggregate and verifiably encrypted signatures from bilinear maps[C]//Proceedings of Advances in Cryptology-EUROCRYPT'03.Berlin,Germany:Springer,2003:416-432. [5] ZHANG Jianhong,ZHAO Xubing.An efficient revocable certificateless signature scheme[C]//Proceedings of the 12th IEEE International Conference on Fuzzy Systems and Knowledge Discovery.Zhangjiajie,China:[s.n.],2015:323-331. [6] KUMAR P,SHARMA V.A comment on efficient certificateless aggregate signature scheme[C]//Proceedings of International Conference on Computing,Communication and Automation.Greater Noida,India:[s.n.],2017:421-433. [7] KUMAR P,SHARMA V,SHARMA G.Certificateless aggregate signature schemes:a review[C]//Proceedings of International Conference on Computing,Communication and Automation.Greater Noida,India:[s.n.],2016:135-143. [8] XIONG Hu,GUAN Zhi,CHEN Zhong,et al.An efficient certificateless aggregate signature with constant pairing computations[J].Information Sciences,2013,219(10):225-235. [9] HOU Hongxie,ZHANG Huefeng,DONG Xiaoli.Improved certificateless aggregate signature scheme[J].Journal of Shandong University(Natural Science),2013,48(9):29-34.(in Chinese) 侯红霞,张雪锋,董晓丽.改进的无证书聚合签名方案[J].山东大学学报(理学版),2013,48(9):29-34. [10] DENG Jiang,XU Chunxiang,WU Huai,et al.An improved certificateless aggregate signature[C]//Proceedings of IEEE International Conference on Computer and Information Technology.Xi'an,China:[s.n.],2014:532-545. [11] KUMAR P,SHARMA V,SHARMA G.Cryptanalysis of a certificateless aggregate signature scheme[C]//Proceedings of International Conference on Computing,Communication and Automation.Noida,India:[s.n.],2016:135-143. [12] MING Yang,ZHAO Xiangmo,WANG Yumin.Certificateless aggregate signature scheme[J].Journal of University of Electronic Science and Technology of China,2014,43(2):188-193.(in Chinese) 明洋,赵祥模,王育民.无证书聚合签名方案[J].电子科技大学学报,2014,43(2):188-193. [13] CHEN Hu,WEI Shimin,ZHU Changjie,et al.Secure certificateless aggregate signature scheme[J].Journal of Software,2015,26(5):1173-1180.(in Chinese)陈虎,魏仕民,朱昌杰,等.安全的无证书聚合签名方案[J].软件学报,2015,26(5):1173-1180. [14] DU Hongzhen,HUANG Meijuan,WEN Qiaoyan.Efficient and provably-secure certificateless aggregate signature scheme[J].Acta Electronica Sinica,2013,41(1):72-76.(in Chinese)杜红珍,黄梅娟,温巧燕.高效的可证明安全的无证书聚合签名方案[J].电子学报,2013,41(1):72-76. [15] LU Haijun,XIE Qi.An efficient certificateless aggregate signcryption scheme from pairings[C]//Proceedings of International Conference on Electronics,Communications and Control.Ningbo,China:[s.n.],2011:137-146. [16] TU Hang,HE Debiao,HUANG Baojun.Reattack of a certif-icateless aggregate signature scheme with constant pairing computations[J].Scientific World Journal,2014(3):9-10. [17] ZHANG Lei,ZHANG Futai.Security model for certificate-less aggregate signature schemes[C]//Proceedings of International Conference on Computational Intelligence and Security.Suzhou,China:[s.n.],2008:243-253. [18] ZHANG Lei,QIN Bo,WU Qianhong,et al.Efficient many-to-one authentication with certificateless aggregate signatures[J].Computer Networks the International Journal of Computer & Telecommunications Networking,2010,54(14):2482-2491. [19] YU Huifang,YANG Bo.Provably secure certificateless hybrid signcryption[J].Journal of Software,2015,38(4):804-813.(in Chinese)愈惠芳,杨波.可证安全的无证书混合签密方案[J].计算机学报,2015,38(4):804-813. [20] CHEN Yuchi,HORNG G,LIU Chaoliang,et al.Efficient certificateless aggregate signature scheme[J].Journal of Electronic Science and Technology,2012,10(3):209-214. [21] ZHONG Hong,HUANG Bo,CUI Jie,et al.Conditional privacy-preserving authentication using registration list in vehicular Ad hoc networks[J].IEEE Access,2018(6):2241-2250. |