Shamir A. Identity-based cryptosystems and signatureschemes[C]. Crypto1984, 1984, LNCS 196: 47-53.[2]Boneh D and Franklin M. Identity-based encryption from theWeil pairings[C]. Crypto2001, 2001, LNCS 2139: 213-229.[3]Wang L L, Zhang G Y, and Ma C G. A survey of ringsignature[J].Frontiers of Electrical and ElectronicEngineering in China.2008, 3(1):10-19[4]Zhang F and Kim K. ID-based blind signature and ringsignature from pairings[C]. Asiacrypt2002, 2002, LNCS 2501:533-547.[5]Xu J, Zhang Z F, and Feng D G. A ring signature schemeusing bilinear pairings[C]. WISA2004, 2004, LNCS 3325:163-172.[6]Chow S S M, Yiu S M, and Hui L C K. Efficient identitybased ring signature[C]. ACNS2005, 2005, LNCS 3531:499-512.[7]Chow S S M, Lui R W C, and Hui L C K, et al.. Identitybased ring signature: why, how and what next[C].EuroPKI2005, 2005, LNCS 3545: 144-161.[8]王玲玲, 张国印, 马春光. 一种签名长度固定的基于身份的环签名方案[J].电子与信息学报.2007, 29(11):2645-2648浏览[9]王化群, 张力军, 赵君喜. 两种环签名方案的安全性分析及其改进[J].电子与信息学报.2007, 29(1):201-204浏览[10]Canetti R, Goldreich O, and Halevi S. The random oraclemethodology, revisited[J].Journal of the ACM.2004, 51(4):557-594[11]Waters B. Efficient identity-based encryption withoutrandom oracles[C]. Eurocrypt2005, 2005, LNCS 3494:114-127.[12]Au M H, Liu J K, and Yuen T H, et al.. ID-based ringsignature scheme secure in the standard model[C]. IWSEC2006, 2006, LNCS 4266: 1-16.[13]张跃宇, 李晖, 王育民. 标准模型下基于身份的环签名方案[J].通信学报, 2008, 29(4): 40-44.Zhang Yue-yu, Li Hui, and Wang Yu-min. Identity-basedring signature scheme under standard model[J]. Journal ofCommunications, 2008, 29(4): 40-44.
|