[1]Mambo M, Usuda K, Okamoto E. Proxy signature:Delegation of the power to sign message[J]. IECE Transactions on Fundamentals, 1996,E79A (9):13381353.
[2]Chaum D. Blind signatures for untraceable payments[C]∥Proc of Crypto’82, 1982:199203.
[3]Alriyami S, Paterson K. Certificateless public key cryptography[C]∥Proc of Asiacrypt’03, 2003:452 473.
[4]Tang Pengzhi, Li Biao, Li Xiaoxiong. The certificateless proxy blind signature scheme based on multilinear pairing[J]. Journal of Hefei University of Technology, 2012,35(5):613616.(in Chinese)
[5]Wei Chunyan, Cai Xiaoqiu. New certificateless proxy blind signature scheme[J]. Journal of Computer Applications,2010,30(12):33413342.(in Chinese)
[6]Fan C I, Sun W, Huang V SM. Provably secure randomized blind signature scheme based on bilinear pairing[J].Computers and Mathematics with Applications, 2010, 60(2):285293.
[7]Koblitz N, Menezes A J, Vanstone S A. The state of elliptic curve cryptography[J]. Design,Codes and Cryptography, 2000,19(23):173193.
[8]Menezes A, van Oorschot P, Vanstone C S. Handbook of applied cryptography[M]. Florida:Boca Raton,CRC Press, 1997.
[9]Zhang Y, Liu W, Lou W, et al. Securing mobile ad hoc networks with certificateless public keys[J]. IEEE Transactions on Dependable and Secure Computing, 2006,3(4):386399.
[10]Zhang Jianzhong, Peng Lihui, Xue Ronghong. Certificateless proxy blind signature scheme[J]. Computer Engineering,2011,37(14):122123.(in Chinese)
[11]Zhang Jianzhong, Yang Li. Cryptography analysis and improvement on certificateless proxy blind signature scheme[J]. Computer Engineering and Applications,2013,49(22):100103.(in Chinese)
[12]Chen Hu,Song Rushun. Certificateless proxy signature and proxy blind signature schemes[J]. Computer Engineering and Applications,2009,45(10):9297.(in Chinese)
[13]Wu Chenhuang,Liang Hongmei,Chen Zhixiong.Improvement of certificateless proxy blind signature schemes[J]. Computer Engineering and Applications,2011,47(1):8991.(in Chinese)
[14]Cai Guangxing, Chen Hua. New IDbased proxy blind signature scheme from bilinear pairings[J]. Computer Engineering,2007,33(9):145147.(in Chinese)
[15]Chen Lingling, Kang Baoyuan, Zhang Lei. A kind of high efficient identitybased proxy blind signature scheme[J]. Journal of East China Jiaotong University,2008,25(1):113116.(in Chinese)
附中文参考文献:
[4]汤鹏志,李彪,李晓雄.基于多线性映射的无证书代理盲签名方案[J]. 合肥工业大学学报(自然科学版), 2012,35(5):613616.
[5]魏春艳,蔡晓秋.新的无证书代理盲签名方案[J].计算机应用,2010,30(12):33413342.
[10]张建中,彭丽慧,薛荣红. 一个无证书代理盲签名方案[J]. 计算机工程,2011,37(14):122123.
[11]张建中,杨丽.无证书代理盲签名方案的密码学分析与改进[J]. 计算机工程与应用,2013,49(22):100103.
[12]陈虎,宋如顺. 无证书代理签名和代理盲签名方案[J]. 计算机工程与应用,2009,45(10):9297.
[13]吴晨煌,梁红梅,陈智雄.一个无证书代理盲签名方案的改进[J].计算机工程与应用,2011,47(1):8991.
[14]蔡光兴,陈华. 一种新的基于身份的代理盲签名方案[J]. 计算机工程,2007,33(9):145147.
[15]陈玲玲,亢保元,张磊. 一种高效的基于身份的代理盲签名方案[J].华东交通大学学报,2008,25(1):113116. |