1 |
ZHANG X W, YE C J. A novel privacy protection of permissioned blockchains with conditionally anonymous ring signature[J]. Cluster Computing, 2022, 25(2):1221-1235. 10.1007/s10586-021-03529-4
|
2 |
佘维,霍丽娟,刘炜,等. 一种可隐藏敏感文档和发送者身份的区块链隐蔽通信模型[J]. 电子学报, 2022, 50(4):1002-1013. 10.12263/DZXB.20211021
|
|
SHE W, HUO L J, LIU W, et al. A blockchain-based covert communication model for hiding sensitive documents and sender identity[J]. Acta Electronica Sinica, 2022, 50(4): 1002-1013. 10.12263/DZXB.20211021
|
3 |
HERRANZ J, SÁEZ G. New identity-based ring signature scheme[C]// Proceedings of the 2004 International Conference on Information and Communications Security, LNCS 3269. Berlin: Springer, 2004: 27-39.
|
4 |
CHOW S S M, YIU S M, HUI L C K. Efficient identity based ring signature[C]// Proceedings of the 2005 International Conference on Applied Cryptography and Network Security, LNCS 3531. Berlin: Springer, 2005: 499-512.
|
5 |
SHOR P W. Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer[J]. SIAM Journal on Computing, 1997, 26(5):1484-1509. 10.1137/s0097539795293172
|
6 |
WANG L P, CHEN J, ZHANG K, et al. A post-quantum hybrid encryption based on QC-LDPC codes in the multi-user setting[J]. Theoretical Computer Science, 2020, 835: 52-96. 10.1016/j.tcs.2020.06.013
|
7 |
卫宏儒,黄靖怡. SOTS:一个基于哈希函数更短的后量子数字签名方案[J]. 计算机研究与发展, 2021, 58(10):2300-2309. 10.7544/issn1000-1239.2021.20210619
|
|
WEI H R, HUANG J Y. SOTS: a Hash function-based shorter post-quantum digital signature scheme[J]. Journal of Computer Research and Development, 2021, 58(10): 2300-2309. 10.7544/issn1000-1239.2021.20210619
|
8 |
RIVEST R L, SHAMIR A R L, TAUMAN Y. How to leak a secret[C]// Proceedings of the 2001 International Conference on the Theory and Application of Cryptology and Information Security, LNCS 2248. Berlin: Springer, 2001: 552-565.
|
9 |
王凤和,胡予濮,王春晓. 格上基于盆景树模型的环签名[J]. 电子与信息学报, 2010, 32(10): 2400-2403. 10.3724/sp.j.1146.2009.01491
|
|
WANG F H, HU Y P, WANG C X. A lattice-based ring signature scheme from bonsai trees[J]. Journal of Electronics and Information Technology, 2010, 32(10): 2400-2403. 10.3724/sp.j.1146.2009.01491
|
10 |
WANG J, SUN B. Ring signature schemes from lattice basis delegation[C]// Proceedings of the 2011 International Conference on Information and Communications Security, LNCS 7043. Berlin: Springer, 2011: 15-28.
|
11 |
田苗苗,黄刘生,杨威. 高效的基于格的环签名方案[J]. 计算机学报, 2012, 35(4):712-718. 10.3724/sp.j.1016.2012.00712
|
|
TIAN M M, HUANG L S, YANG W. Efficient lattice-based ring signature scheme[J]. Chinese Journal of Computers, 2012, 35(4):712-718. 10.3724/sp.j.1016.2012.00712
|
12 |
李玉海,田苗苗,黄刘生. 一种格上基于身份的环签名方案[J]. 小型微型计算机系统, 2013, 34(8):1768-1771. 10.3969/j.issn.1000-1220.2013.08.012
|
|
LI Y H, TIAN M M, HUANG L S. An identity-based ring signature scheme from lattices[J]. Journal of Chinese Computer Systems, 2013, 34(8): 1768-1771. 10.3969/j.issn.1000-1220.2013.08.012
|
13 |
张利利,卜春霞. 格上基于身份的高效环签名方案及安全性分析[J]. 数学的实践与认识, 2015, 45(1):177-181.
|
|
ZHANG L L, BU C X. Efficient lattice-based identity-based ring signature and analysis of security[J]. Mathematics in Practice and Theory, 2015, 45(1): 177-181.
|
14 |
孙意如,梁向前,商玉芳. 理想格上基于身份的环签名方案[J]. 计算机应用, 2016, 36(7):1861-1865,1880. 10.11772/j.issn.1001-9081.2016.07.1861
|
|
SUN Y R, LIANG X Q, SHANG Y F. Identity based ring signature scheme in ideal lattice[J]. Journal of Computer Applications, 2016, 36(7): 1861-1865, 1880. 10.11772/j.issn.1001-9081.2016.07.1861
|
15 |
贾小英,何德彪,许芷岩,等. 格上高效的基于身份的环签名体制[J]. 密码学报, 2017, 4(4):392-404.
|
|
JIA X Y, HE D B, XU Z Y, et al. An efficient identity-based ring signature scheme over a lattice[J]. Journal of Cryptologic Research, 2017, 4(4):392-404.
|
16 |
赵宗渠,葛炳辉,赵楠楠,等. 格上高效的环签名方案[J]. 计算机应用研究, 2021, 38(6):1855-1858.
|
|
ZHAO Z Q, GE B H, ZHAO N N, et al. Efficient ring signature scheme on lattice[J]. Application Research of Computers, 2021, 38(6):1855-1858.
|
17 |
TANG Y L, XIA F F, YE Q, et al. Identity-based linkable ring signature on NTRU lattice[J]. Security and Communication Networks, 2021, 2021: No.9992414. 10.1155/2021/9992414
|
18 |
ZHOU Y H, DONG S S, YANG Y G. Ring signature scheme based on lattice and its application on anonymous electronic voting[J]. KSII Transactions on Internet and Information Systems, 2022, 16(1): 287-304.
|
19 |
SHAMIR A. Identity-based cryptosystems and signature schemes[C]// Proceedings of the 1984 Workshop on the Theory and Application of Cryptographic Techniques, LNCS 196. Berlin: Springer, 1985: 47-53. 10.1007/3-540-39568-7_5
|
20 |
GENTRY C, PEIKERT C, VAIKUNTANATHAN V. Trapdoors for hard lattices and new cryptographic constructions[C]// Proceedings of the 40th Annual ACM Symposium on Theory of Computing. New York: ACM, 2008: 197-206. 10.1145/1374376.1374407
|
21 |
AGRAWAL S, BONEH D, BOYEN X. Efficient lattice (H)IBE in the standard model[C]// Proceedings of the 2010 Annual International Conference on the Theory and Applications of Cryptographic Techniques, LNCS 6110. Berlin: Springer, 2010:553-572.
|
22 |
STEHLÉ D, STEINFELD R. Making NTRU as secure as worst-case problems over ideal lattices[C]// Proceedings of the 2011 Annual International Conference on the Theory and Applications of Cryptographic Techniques, LNCS 6632. Berlin: Springer, 2011: 27-47.
|
23 |
AJTAI M. Generating hard instances of the short basis problem[M]// WIEDERMANN J, EMDE BOAS P van, NIELSEN M. Automata, Languages and Programming: 26th International Colloquium, ICALP' 99. Berlin: Springer, 1999:1-9. 10.1007/3-540-48523-6_1
|
24 |
LYUBASHEVSKY V. Lattice signatures without trapdoors[C]// Proceedings of the 2012 Annual International Conference on the Theory and Applications of Cryptographic Techniques, LNCS 7237. Berlin: Springer, 2012: 738-755.
|
25 |
BENDER A, KATZ J, MORSELLI R. Ring signatures: stronger definitions, and constructions without random oracles[J]. Journal of Cryptology, 2009, 22(1): 114-138. 10.1007/s00145-007-9011-9
|
26 |
CASH D, HOFHEINZ D, KILTZ E, et al. Bonsai trees, or how to delegate a lattice basis[J]. Journal of Cryptology, 2012, 25(4): 601-639. 10.1007/s00145-011-9105-2
|
27 |
PEIKERT C. An efficient and parallel Gaussian sampler for lattices[C]// Proceedings of the 2010 Annual Cryptology Conference, LNCS 6223. Berlin: Springer, 2010:80-97.
|
28 |
LYUBASHEVSKY V, PREST T. Quadratic time, linear space algorithms for Gram-Schmidt orthogonalization and Gaussian sampling in structured lattices[C]// Proceedings of the 2015 Annual International Conference on the Theory and Applications of Cryptographic Techniques LNCS 9056. Berlin: Springer, 2015: 789-815. 10.1007/978-3-662-46800-5_30
|
29 |
MICCIANCIO D, PEIKERT C. Trapdoors for lattices: simpler, tighter, faster, smaller[C]// Proceedings of the 2012 Annual International Conference on the Theory and Applications of Cryptographic Techniques, LNCS 7237. Berlin: Springer, 2012: 700-718.
|
30 |
蒋玉章. 基于环签名和区块链的车联网隐私保护方案[D]. 成都:西华大学, 2021.
|
|
JIANG Y Z. Privacy protection scheme of vehicular ad hoc networks based on ring signature and blockchain[D]. Chengdu: Xihua University, 2021.
|
31 |
韩龙博. 格基环签名的研究与应用[D]. 兰州:西北师范大学, 2021.
|
|
HAN L B. Research and application of lattice-based ring signature[D]. Lanzhou: Northwest Normal University, 2021.
|