[1]AL-RIYAMI S, PATERSON K. Certificateless public key cryptography[C]// Cryptology-Asiacrpt 2003. Berlin: Spring-Verlag, 2003:452-473.
[2]HUANG X, MU Y, SUSILO W, et al. Certificateless signature revisited[C]// Proceedings of the 12nd Australian Conference on Information Security and Privacy, LNCS 4586. Berlin: Springer-Verlag, 2007:308-322.
[3]ZHANG L, ZHANG F T, ZHANG F G. New efficient certificateless signature scheme[C]// Proceedings of the EUC Workshops 2007. Berlin: Springer-Verlag, 2007:692-703.
[4]YUAN Y, LI D, TIAN L, et al. Certificateless signature scheme without random oracles[C]// Proceedings of the ISA 2009. Berlin: Springer-Verlag, 2009:31-40.
[5]YUAN H, ZHANG F, HUANG X, et al. Certificateless threshold signature scheme from bilinear maps[J].Information Sciences,2010,180(23):4714-4728.
[6]WANG S, LIU W, XIE Q. Certificateless signature scheme without bilinear pairings[J]. Journal on Communications, 2012, 33(4):93-98. (王圣宝,刘文浩,谢琪.无双线性配对的无证书签名方案[J].通信学报,2012,33(4):93-98.)
[7]WANG Y, DU W. Security analysis and improvement of certificateless signature scheme without bilinear pairing[J]. Journal of Computer Applications, 2013, 33(8):2250-2252.(王怡,杜伟章.无双线性对的无证书签名方案的分析和改进[J].计算机应用,2013,33(8):2250-2252.)
[8]CHAUM D. Blind signatures for untraceable payments[C]// Proceedings of Crypto83. Heidelberg: Springer-Verlag, 1983: 199-203.
[9]YAO Y, ZHU H, CHEN K. Generalized ElGamal type blind signature based on affine transform[J]. Acta Electronica Sinica,2000,28(7):128-129.(姚亦峰, 朱华飞, 陈抗生. 基于二元仿射变换的广义ElGamal型盲签名方案[J] . 电子学报, 2000, 28(7): 128-129.)
[10]SU W, ZHANG Y, ZHANG X, et al. Certificateless blind signature scheme[J].Journal of University of Electronic Science and Technology of China, 2009,38(4):533-536.(苏万力,张跃宇,张晓红,等.无证书盲签名方案[J].电子科技大学学报,2009,38(4):533-536.)
[11]YANG X, LIANG Z, GUO Y, et al. An efficient certificateless blind signature scheme[J]. Journal of Nanjing University of Posts and Telecommunications: Natural Science Edition, 2009,29(3):37-42. (杨晓元,梁中银,郭耀,等. 一个高效的无证书盲签名方案[J].南京邮电大学学报:自然科学版,2009,29(3):37-42.)
[12]POINTCHEVAL D, STEM J. Security arguments for digital signatures and blind signatures[J].Journal of Cryptology, 2000, 13(3):361-396. |