Chaum D and Heyst F. Group signature[A]. EUROCRYPT91, LNCS 547, Berlin: Springer-verlag, 1992: 257-265.[2]Wang G L. Security analysis of several group signature schemes[A]. In: Indocrypt2003, LNCS2904, Berlin: Springer-Verlag, 2003: 252-265.[3]Joye M, Lee N Y, and Hwang T. On the security of the Lee-Chang group signature scheme and its derivatives[A]. In: Information Security (ISW'99), LNCS 1729, Berlin: Springer-Verlag, 1999: 47-51.Joye M, Kim S, and Lee N Y. Cryptanalysis of two group signature schemes[A]. In: Information Security (ISW'99), LNCS 1729, Berlin: Springer-Verlag, 1999: 271-275.[4]Wang G L. On the security of a group signature scheme with forward security[A]. In: Information Security and Cryptography (ICISC 2003), LNCS 2971, Berlin: Springer-Verlag, 2004: 27-39.[5]Lysyanskaya A and Ramzan Z. Group blind signature: A scalable solution to electronic cash[A]. Financial Cryptography (FC '98), LNCS 1465, Berlin:Springer-Verlag, 1998: 184-197.[6]Tseng Y M and Jan J K. Improved group signature scheme based on the discrete logarithm problem[J].Electron. Lett.1999, 35(1):37-38[7]Sun H M. Comment: Improved group signature scheme based on the discrete logarithm problem[J].Electron. Lett.1999, 35(16):1323-1324[8]Ateniese G, Camenisch J, Joye M, and Tsudik G. A practical and provably secure coalition-resistant group signature scheme[A]. In: CRYPTO 2000, LNCS1880, Berlin: Springer-Verlag, 2000: 255-270.[9]张键红,伍前红,邹建成,王育民. 一种高效的群签名[J]. 电子学报,2005, 33(6): 1113-1115. Zhang J H, Wu Q H, Zou J C, and Wang Y M. An efficient group signature scheme[J]. Acta Electronica Sinca, 2005, 33(6): 1113-1115.
|