[1]SHAMIR A. Identity-based cryptosystems and signature schemes [C]// Advances in Cryptology- Crypto'84. New York: Springer-Verlag, 1984: 47-53.[2]AL-RIYAMI S S, PATERSON K G. Certificateless public key cryptography[C]// Advances in Cryptology- Asiacrypt' 03, LNCS 2894. Berlin: Springer-Verlag, 2003, 452-473.[3]张福泰, 孙银霞, 张磊, 等. 无证书公钥密码体制研究[J]. 软件学报, 2011, 22(6): 1316-1332.[4]HUANG X Y, SUSILO W, MU Y, et al.On the security of certificateless signature schemes from Asiacrypt 2003[C]// CANS 2005:Cryptology and Network Security, LNCS 3810. Berlin: Springer-Verlag, 2005:13-25.[5]ZHANG Z F, WONG D S, XU J, et al.Certificateless public-key signature: Security model and efficient construction[C]// ACNS 2006:Applied Cryptography and Network Security, LNCS 3989. Berlin: Springer-Verlag, 2006:293-308.[6]HUANG X Y, MU Y, SUSILO W, et al. Certificateless signature revisited[C]// Information Security and Privacy, ACISP 2007, LNCS 4586. Berlin: Springer-Verlag, 2007:308-322.[7]LIU J K, AU M H, SUSILO W. Self-generated-certificate public key cryptography and certificateless signature/ encryption scheme in the standard model[C]// Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security. New York: ACM Press, 2007:273-283.[8]刘景伟, 孙蓉, 马文平. 高效的基于ID的无证书签名方案[J]. 通信学报, 2008, 29(2): 87-94[9]吴晨煌, 梁红梅, 陈智雄, 等. 一个高效的基于ID的无证书签名方案的安全性分析及改进[J]. 漳州师范学院学报:自然科学版, 2009, 22(1):26-29.[10]HE D B, CHEN J H, ZHANG R. Efficient and provably-secure certificateless signature scheme without bilinear pairings[EB/OL]. (2010-02-20) [2012-10-15]. http://eprint. iacr.org/2010/632.pdf.[11]TIAN M M, HUANG L S. Cryptanalysis of a certificateless signature scheme without pairings[J/OL]. International Journal of Communication Systems, 2012, 1-7. doi:10. 1002/dac.2310. [2012-10-15]. http://onlinelibrary.wiley.com/ doi/10.1002/dac.2310/full.[12]夏峰, 杨波. 公钥不可替换无证书签名方案[J]. 计算机科学, 2012, 39(8):92-95.[13]苏万力, 李晖, 张跃宇, 等. 一种有效的无证书签名方案[J]. 江苏大学学报, 2009, 30(4): 401-404.[14]郭玲玲, 林昌露, 张胜元. 针对一类无证书签名方案的攻击及改进[J]. 计算机工程, 2012, 38(16): 134-137,141.[15]POINTCHEVAL D, STERN J. Security arguments for digital signatures and blind signatures[J]. Journal of Cryptology, 2000, 13(3): 361-396.[16]RAFAEL C, RICARDO D. Two notes on the security of certificateless signatures[C]// Proceedings of First International Conference on Provable Security. Berlin: Springer-Verlag, 2007: 85-102. |