Shamir A. Identity-based cryptosystems and signatureschemes[J].Advances in CryptologyCrypto.1984, LNCS196:47-53[2]Boneh D and Franklin M. Identity-based encryption fromthe weil pairing[J].Advances in Cryptology.Crypto.2001,LNCS 2139:213-229[3]Rivest R, Shamir A, and Tauman Y. How to leak a secret[J].In: Advances in Cryptology..AsiaCrypt01, Berlin: Springer-Verlag.2001, LNCS 2248:552-565[4]Zhang Fangguo and Kim Kwangjo. ID-based blind signatureand ring signature from pairings[J].Advances in CryptologyAsiaCrypt.2002, LNCS 2501:533-547[5]Herranz J and Saez G. New identity-based ring signatureschemes[J].International Conference on Information andCommunications SecurityICICS.2004, LNCS 3269:27-39[6]Chow S S M, Yiu S M, and Hui L C K. Efficient identitybased ring signature[J].Applied Cryptography and NetworkSecurityACNS.2005, LNCS 3531:499-512[7]Liu J K, Wei V K, and Wong D S. Linkable spontaneousanonymous group signature for Ad-hoc groups (ExtendedAbstract)[J].In: ACISP04, Berlin: Springer-Verlag.2004,LNCS 3108:325-335[8]Mao Ho Au, Chow S S M, Susilo W, and Tsang P P. Shortlinkable ring signatures revisited. In: EuroPKI 2006, Berlin:Springer-Verlag, 2006, LNCS 4043: 101-115.[9]Lee K C, Wen H A, and Hwang T. Convertible ringsignature[J].IEE Proc-Commun.2005, 152(4):411-414[10]Bresson E, Stern J, and Szydlo M. Threshold ringsignatures and applications to Ad-hoc group. In: Crypto2002, Berlin: Springer-Verlag, 2002, LNCS 2442: 465-480.[11]Chow S S M, Liu R W C, Hui L C K, and Yiu S M.Identity-based ring signature: why, how and what next. In:EuroPKI 2005, Berlin: Springer-Verlag, 2005, LNCS 3545:144-161.[12]Abe M, Ohkubo M, and Suzuki K. 1-out-of-n signaturesfrom a variety of keys. Advances in Cryptology.AsiaCrypt2002, LNCS 2501: 415-432.[13]Gao Wei, Wang Guilin, Wang Xueli, and Xie Dongqing.Controllable ring signatures. The 7th InternationalWorkshop on Information Security Applications (WISA2006), Springer-Verlag, 2006, LNCS 4298: 1-14.
|