[1]SHAMIR A. Identity-based cryptosystems and signature schemes [C]// Proceedings of the 4th Annual International Cryptology Conference, LNCS 196. Berlin: Springer-Verlag, 1985: 47-53.[2]BONEH D, FRANKLIN M. Identity-based encryption from the Weil pairing [C]// Proceedings of the 21st Annual International Cryptology Conference, LNCS 2139. Berlin: Springer-Verlag, 2001: 213-229.[3]BONEH D, BOYEN X. Efficient selective-id secure identity-based encryption without random oracles [C]// Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques 2004, LNCS 3027. Berlin: Springer-Verlag, 2004: 223-238.[4]WATERS B. Efficient identity-based encryption without random oracles [C]// Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques 2005, LNCS 3494. Berlin: Springer-Verlag, 2005: 114-127.[5]PATERSON K, SCHULDT J. Efficient identity-based signatures secure in the standard model [C]// Proceedings of the 11th Australasian Conference on Information Security and Privacy, LNCS 4058. Berlin: Springer-Verlag, 2006: 207-222.[6]李继国,姜平进.标准模型下可证安全的基于身份的高效签名方案[J].计算机学报,2009,32(11):2130-2136.[7]谷科,贾维嘉,姜春林.高效安全的基于身份的签名方案[J].软件学报,2011,22(6):1350-1360.[8]李聪,闫德勤,郑宏亮.标准模型下高效安全的基于身份多签密方案[J].计算机应用,2012,32(4):957-959.[9]于义科,郑雪峰.标准模型下基于身份的高效动态门限代理签名方案[J].通信学报,2011,32(8):55-63.[10]于义科,郑雪峰,韩晓光,等.一种标准模型下基于身份的高效门限代理签名方案[J].计算机应用研究,2011,28(3):1136-1141.[11]冀会芳,韩文报,刘连东.新的标准模型下基于身份的代理签名方案[J].计算机科学,2011,38(8):88-91.[12]王天芹,苏莉文.标准模型下安全的基于身份的可验证加密签名[J].计算机科学,2011,38(B10):101-105.[13]孙华,郭磊,郑雪峰,等.一种可证安全的基于身份门限代理签密方案[J].计算机科学,2012,39(4):101-105. |