[1]GENTRY C. Certificate-based encryption and the certificate revocation problem [C]// Proceedings of EUROCRYPT 2003. Berlin: Springer-Verlag, 2003:272-293.[2]KANG B G, PARK J H, HAHN S G. A certificate-based signature scheme[C]// Proceedings of CT-RSA 2004. Berlin: Springer-Verlag, 2004:99-111.[3]LI J G, HUANG X Y, MU Y, et al. Certificate-based signature: security model and efficient construction [C]// Proceedings of EuroPKI 2007. Berlin: Springer-Verlag, 2007:110-125.[4]LI J G, XU L Z, ZHANG Y C. Provably secure certificate-based proxy signature schemes [J]. Journal of Computers, 2009, 4(6):444-452.[5]LI J G, HUANG X Y, ZHANG Y C, et al. An efficient short certificate-based signature scheme [J]. The Journal of Systems and Software, 2012, 85(2012):314-322.[6]JAKOBSSON M, SAKO K, IMPAGLIAZZO R. Designated verifier proofs and their applications [C]// Proceedings of EUROCRYPT 1996. Berlin: Springer-Verlag, 1996:143-154.[7]SAEEDNIA S, KREMER S, MARKOWITCH O. An efficient strong designated verifier signature scheme [C]// Proceedings of ICISC '2003. Berlin: Springer-Verlag, 2004:40-54.[8]SUSILO W, ZHANG F T, MU Y. Identity-based strong designated verifier signature schemes[C]// Proceedings of ACISP '2004. Berlin: Springer-Verlag, 2004:313-324.[9]ZHANG J, MAO J. A novel ID-based designated verifier signature scheme [J]. Information Sciences, 2008, 178(3):766-773.[10]KANG B Y, BOYD C, DAWSON E. Identity-based strong designated verifier signature schemes: Attacks and new construction [J].Computers and Electrical Engineering, 2009, 35(1):49-53.[11]李明详,郑雪峰,朱建勇,等. 一种高效的基于身份的强指定验证者签名方案[J]. 四川大学学报:工程科学版, 2009,41(4):176-180.[12]孙士峰,温巧燕,金正平,等. 对一类强指定验证者签名方案的分析与改进[J]. 四川大学学报:工程科学版, 2011,43(1):91-96.[13]张永洁,王彩芬,张玉磊. 两个指定验证者签名方案的分析与改进[J]. 计算机应用, 2010, 30(5)1227-1229. |