[1] |
Mambo M, Usuda K, Okamoto E. Proxy signature for delegating signing operation [C]∥Proc of the 3rd ACM Conference on Computer and Communications Security, 1996:4857.
|
[2] |
Shamir A.Identitybased cryptosystems and signature schemes [C]∥Proc of Crypto 1984, 1984:4753.
|
[3] |
Xu J,Zhang Z, Feng D. IDbased proxy signature using bilinear pairings[C]∥Proc of the 3rd International Symposium on Parallel and Distributed Processing and Applications, 2005:359367.
|
[4] |
Paterson K G, Schuldt J C N. Efficient identitybased signatures secure in the standard model [C]∥Proc of the 11th Australasian Conference on Information Security and Privacy, 2006:207222.
|
[5] |
Wu W, Mu Y, Susilo W, et al. Identitybased proxy signature from pairings[C]∥Proc of the 4th International Conference on Autonomic and Trusted Computing, 2007:2231.
|
[6] |
Li Mingxiang, Han Baitao, Zhu Jianyong, et al. Identitybased proxy signature scheme secure in standard model[J]. Journal of South China University of Technology (Natural Science Edition), 2009, 37(5):118129.(in Chinese)
|
[7] |
Li Jiguo, Jiang Pingjin. An efficient and provably secure identitybased signature scheme in the standard model[J]. Chinese Journal of Computers, 2009, 32(11), 21312136.(in Chinese)
|
[8] |
Ji Huifang,Han Wenbo,Liu Liandong.New identitybased proxy signature in the standard model [J]. Computer Science, 2011, 38(8):8891.(in Chinese)
|
[9] |
Yu Yike, Zhen Xuefeng, Han Xiaoguang, et al. Efficient idbased proxy signature in the standard model [J]. Computer Science, 2011, 38(6):133139.(in Chinese)
|
[10] |
Zhang Y, Liu J, Huang X, et al. Efficient escrowfree identitybased signature[C]∥Proc of the 6th International Conference, 2012:161174.
|
[11] |
Waters B. Efficient identitybased encryption without random oracles [C]∥Proc of Eurocrypt, SpringerVerlag, 2005:114127.
|
[12] |
Lee B, Kim H, Kim K. Strong proxy signature and its applications[C]∥Proc of the 2001 Symposium on Cryptography and Information Security, 2001:2326.
|
|
附中文参考文献:
|
[6] |
李明祥, 韩伯涛, 朱建勇, 等.在标准模型下安全的基于身份的代理签名方案[J]. 华南理工大学学报(自然科学版), 2009, 37(5):118129.
|
[7] |
李继国, 姜平进. 标准模型下可证安全的基于身份的高效签名方案[J]. 计算机学报, 2009, 32(11):21312136.
|
[8] |
冀会芳, 韩文报, 刘连东. 新的标准模型下基于身份的代理签名方案[J]. 计算机科学, 2011, 38(8):8891.
|
[9] |
于义科, 郑雪峰, 韩晓光, 等. 一个标准模型下基于身份的高效代理签名方案[J]. 计算机科学, 2011, 38(6):133139.
|