[1] |
Luo H,Wang X A.New signature schemes in the standard model based on publicly verifiable CCAsecure public key encryption[J].International Journal of Information and Communication Technology,2015,7(23):235246.
|
[2] |
Cheng L,Wen Q.Provably secure and efficient certificateless signature in the standard model[J].International Journal of Information and Communication Technology,2015,7(23):287301.
|
[3] |
Quisquater J J,De Soete M.Speeding up smart card RSA computations with insecure coprocessors[C]∥Proc of Smart Card,2000:191197.
|
[4] |
Girault M, Lefranc D.Serveraided verification:Theory and practice[C]∥Proc of Advances in Cryptology(ASIACRYPT 2005),2005:605623.
|
[5] |
Wu H,Xu C,Deng J.A serveraided aggregate verification signature scheme from bilinear pairing[C]∥Proc of 2013 IEEE INCoS,2013:503506.
|
[6] |
Lin Q.A provably secure serveraided verification signature[C]∥Proc of 2013 IEEE EIDWT,2013:340343.
|
[7] |
Wang Zhiwei.Research on signature schemes applicable for devices with limited computing capability [D].Beijing:Beijing University of Posts and Telecommunications,2009.(in Chinese)
|
[8] |
Wang Z,Lü W.Serveraided verification proxy resignature[C]∥Proc of Trust,Security and Privacy in Computing and Communications, 2013:17041707.
|
[9] |
Zhang J,Sun Z.An IDbased serveraided verification short signature scheme avoid key escrow[J].Journal of Information Science and Engineering,2013,29(3):459473.
|
[10] |
Wang Z,Xie R,Zhang W,et al.Attributebased serveraided verification signature[J].Applied Mathematics & Information Sciences,2014,8(6):31833190.
|
[11] |
Wu W,Mu Y,Susilo W,et al.Provably secure serveraided verification signatures[J].Computers & Mathematics with Applications,2011,61(7):17051723.
|
[12] |
Wang Z,Wang L,Yang Y,et al.Comment on Wu et al.'s serveraided verification signature schemes[J]. International Journal of Network Security,2010,10(3):238240.
|
[13] |
Wu H,Xu C X, Deng J, et al. On the security of serveraided verification signature schemes[J].Journal of Computational Information System,2013,9(4):14491454.
|
[14] |
Waters B.Efficient identitybased encryption without random oracles[C]∥Proc of EuroCrypt 2005,2005:114127.
|
[15] |
Chow S S M,Au M H,Susilo W.Serveraided signatures verification secure against collusion attack[J].Information Security Technical Report,2013,17(3):4657.
|
[16] |
Wang B, Zhao Q. A serveraided verification signature scheme without random oracles[J].International Review on Computer & Software,2012,7(7):3446.
|
|
附中文参考文献:
|
[7] |
王志伟.适用于低端计算设备的数字签名方案研究[D].北京:北京邮电大学,2009.
|