Rivest R L, Shamir A, and Tauman Y. How to leak a secret[J].Advances in cryptology-AsiaCrypt01, Berlin: Springer-Verlag.2001, LNCS 2248:552-565[2]Masayuki abe, Miyako ohkubo, and Koutarou suzuki.1-out-of-n signatures from a variety of keys. IEICE Trans. onFundamentals, 2004, E87-A: 131-140.[3]Liu Y W, Liu J K, Mu Y, Susilo W, and Wong S. Revocablering signature[J].Journal of Computer Science and Technology.2007, 22(6):785-794[4]Au M H, Liu J K, Susilo W, and Yuen T H. Certificate based(linkable) ring signature. ISPEC 2007, Berlin: Springer-Verlag, 2007, LNCS 4464: 79-92.[5]Zhang Lei, Zhang Futai, and Wu Wei. A provably secure ringsignature scheme in certificateless cryptography. ProvSec2007, Berlin: Springer-Verlag, LNCS 4784: 103-121.[6]Rivest R L, Shamir A, and Tauman Y. How to leak a secret :Theory and Applications of Ring Signatures. Essays inMemory of Shimon Even 2006: 164-186.[7]范安东, 孙琦, 张杨松. 基于环签名的匿名电子投票方案. 四川大学学报(工程科学版), 2008, 40(1): 113-117.Fan An-dong, Sun Qi, and Zhang Yang-song. The scheme ofanonymous electronic voting based on ring signature. Journalof Sichuan University (Engineering Science Edition), 2008,40(1): 113-117.[8]苗付友, 王行甫, 苗辉, 熊焰. 一种支持悬赏的匿名电子举报方案. 电子学报, 2008, 36(2): 320-324.Miao Fu-you, Wang Xing-fu, Miao Hui, and Xiong Yan. Ananonymous e-prosecution scheme with reward support. ActaElectronica Sinica, 2008, 36(2): 320-324.[9]L Jiqiang and Wang Xinmei. Verifiable ring signature. The9th International Conference on Distribted MultimediaSystems, USA, 2003: 663-667.[10]Zhang Changlun, Liu Yun, and He Dequan. A new verifiablering signature scheme based on Nyberg-Rueppel scheme.ICSP2006, Beijing 2006, 4: 16-20.[11]Gan Zhi and Chen Kefei. A new verifiable ring signaturescheme. Acta Scientiarum Naturalium UniversitatisSunyatseni, 2004, 143, Suppl1(2): 132-134.[12]Lee K C, Wen H A, and Hwang T. Convertible ring signature[J].IEE Proc.-Commun.2005, 152(4):411-414[13]Gao Wei, Wang Guilin, Wang Xueli, and Xie Dongqing.Controllable ring signatures. WISA 2006, Berlin: Springer-Verlag, 2007, LNCS4298: 1-14.[14]Wang Lingling, Zhang Guoyin, and Ma Chunguang. A securering signcryption scheme for private and anonymouscommunication. 2007 IFIP International Conference onNetwork and Parallel Computing-Workshops, Harbin, 2007:107-111.
|