[1] |
Steinfeld R, Bull L,Zheng Y L.Content extraction signatures[C]∥Proc of International Conference on Information Security and Cryptology,2001:285-304.
|
[2] |
Lan Cai-hui,Wang Cai-fen.ID-based content extraction signature[J].Journal of Computer Applications,2007,27(10):2456-2458.(in Chinese)
|
[3] |
Cao Su-zhen,Wang Cai-fen.Content extraction signature scheme based on DLP[J].Computer Engineering,2013,39(4):132-136.(in Chinese)
|
[4] |
Li H M, Liang H M, Wang H M,et al. Attack on an efficient certificateless aggregate signature without pairing[J].Wuhan University Journal of Natural Sciences,2020,25(2):139-145.
|
[5] |
Johnson R,Molnar D,Song D X,et al.Homomorphic signature schemes[C]∥Proc of the Cryptographer′s Track at the RSA Conference on Topics in Cryptology,2002:244-262.
|
[6] |
Pohls H C,Samelin K.Accountable redactable signatures[C]∥Proc of the 10th International Conference on Availability, Reliability and Security, 2015:60-69.
|
[7] |
Ma Jin-hua,Huang Xin-yi,Xu Jun-peng,et al.Public accountable redactable signature scheme[J].Journal of Electronics and Information Technology,2020,42(5):1079-1086.(in Chinese)
|
[8] |
Zhang Jian-hong,Xiao Han,Wang Ji-lin. Efficient identity-based RSA multi-signature scheme[J].Journal of Chinese Computer Systems,2018,39(9):1978-1981.(in Chinese)
|
[9] |
Zhang Yu-lei. Efficient certificateless compact sequential multi-signature scheme[J].Computer Engineering,2011,37(8):108-111.(in Chinese)
|
[10] |
Wu T C,Sung H S.An improved one-time digital signature scheme based on one-way function[J].Journal of Information Science and Engineering,1996,12(3):387-395.
|
[11] |
Maxwell G, Poelstra A,Seurin Y,et al.Simple schnorr multi-signatures with applications to bitcoin[J].Designs,Codes and Cryptography,2019,87(4):2139-2164.
|
[12] |
Shu H,Qi P,Huang Y,et al.An efficient certificateless aggregate signature scheme for blockchain-based medical cyber physical systems[J].Sensors,2020,20(5):1521.
|
[13] |
Boneh D,Gentry C,Lynn B,et al.Aggregate and verifiably encrypted signatures from bilinear maps[C]∥Proc of the 22nd International Conference on Theory and Applications of Cryptographic Techniques,2003:416-432.
|
[14] |
Bai L,Hu M,Liu M,et al.BPIIoT:A light-weighted blockchain-based platform for Industrial IoT[J].IEEE Access,2019,7:58381-58393.
|
[15] |
Gentry C, Ramzan Z.Identity-based aggregate signatures[C]∥Proc of International Workshop on Public Key Cryptography,2006:257-273.
|
[16] |
Zhao Pei.A study of fully secure hierarchy attribute-based encryption[D].Xi’an:Xidian University,2015.(in Chinese)
|
|
附中文参考文献:
|
[2] |
蓝才会,王彩芬.基于身份的可截取签名方案[J].计算机应用,2007,27(10):2456-2458.
|
[3] |
曹素珍,王彩芬.基于离散对数问题的可截取签名方案[J].计算机工程,2013,39(4):132-136.
|
[7] |
马金花,黄欣沂,许俊鹏,等.公开可审计的可修订签名方案[J].电子与信息学报,2020,42(5):1079-1086.
|
[8] |
张键红,肖晗,王继林.高效的基于身份RSA多重数字签名[J].小型微型计算机系统,2018,39(9):1978-1981.
|
[9] |
张玉磊.高效的无证书紧致有序多重签名方案[J].计算机工程,2011,37(8):108-111.
|
[16] |
赵佩.完全安全的分层属性加密的研究[D].西安:西安电子科技大学,2015.
|