[1]
AL-RIYAMI S S, PATERSON K G. Certificateless public key cryptography[C] // Advance in Cryptography Asiacrypt 2003,LNCS 2894. Berlin:Springer-Verlag,2003:452-473.
[2]
CHAUM D. Blind signatures for untraceable pryment[C]// Crypto’82:Advances in Cryptology.Berlin:Springer,1982:199-203.
[3]
MAMBO M, USUDA K,OKAMOTO E. Proxy signature: Delegation of the power to sign messages[J]. IEICE Transactions on Fundamentals, 1996, E792A (9): 1338- 1353.
[4]
LEE W B, CANG C Y. Efficient proxy signatures scheme based on discrete logarithm[C]// Proceedings of 10th Conference on Information Security.Washington, DC: IEEE Computer Society, 2000:4-7.
[5]
AMIT K A, SUNDER L.Proxy blind signature scheme[EB/OL].[2012-04-15]. http://eprint.iacr.org/2003/72.
[6]
HU B C,WONG D S, ZHANG ZHENFENG, et al. Certificateless signature: A new security model and an improved generic construction [J].Designs, Codes and Cryptography, 2007, 42(2): 109 - 126.
[7]
ZHANG ZHENFENG, WONG D S, XU JING, et al. Certificateless public-key signature: security model and efficient construction [C]// Proceedings of Applied Cryptography and Network Security,LNCS 3989.Berlin: Springer-Verlag, 2006:293- 308.
[8]
张建中,魏春艳.一种新的无证书代理签名方案[J].计算机工程, 2010, 36(10):168- 172.
[9]
魏春艳,蔡晓秋.新的无证书代理盲签名方案[J].joca,2010,30(12):3341-3345.
[10]
DESMEDT Y, FRANKEL Y. Shared generation of authenticators and signatures[C]// Advances in Cryptology, LNCS 576.Berlin: Springer-Verlag,1991: 457-469.
[11]
张福泰,孙银霞,张磊,等.无证书公钥密码体制研究[J].软件学报,2011,22(6):1316-1332.
[12]
戚艳军,冀汶莉.一种门限代理盲签名方案[J].现代电子技术,2012,35(9):70-72.
[13]
曹天庆,张建中.一个新的无证书的门限代理签名方案[J].计算机工程与应用,2012,48 (9):57-59. |