[1]SHAMIR A. Identity-based cryptosystems and signature schemes[C] // Proceedings of CRYPTO 1984, LNCS 196. Berlin: Springer, 1984: 47-53.[2]BONEH D, FRANKLIN M. Identity-based encryption from the Weil pairing[C] // Proceedings of CRYPTO 2001, LNCS 2139. Berlin:Springer, 2001: 213-229.[3]HESS F. Efficient identity based signature schemes based on pairings[C] // Proceedings of SAC 2002, LNCS 2595. Berlin: Springer, 2003:310-324.[4]PATERSON K G,SCHULDT J C N. Efficient identity-Based signatures secure in the standard model[C] // ACISP 2006: Proceedings of the 11th Australasian Conference on Information Security and Privacy, LNCS 4058. Berlin: Springer, 2006: 207-222.[5]RIVEST R L, SHAMIR A, TAUMAN Y. How to leak a secret[C] // Proceedings of ASIACRYPT 2001, LNCS 2248. Berlin: Springer, 2001: 552-565.[6]WANG H Q, ZHANG F T, SUN Y F. Cryptanalysis of a generalized ring signature scheme[J]. IEEE Transaction on Dependable and Secure Computing, 2009, 6(2): 149-151.[7]WANG H Q, ZHAO S P. Cryptanalysis of several linkable ring signature schemes[C] // NSWCTC 2010: Proceedings of the International Conference on Networks Security Wireless Communications and Trusted Computing. Washington, DC: IEEE Computer Society, 2010:302-305.[8]HU C Y, LIU P T. A new ID-based ring signature scheme with constant-size signature[C] // ICCET 2010: Proceedings of the 2nd International Conference on Computer Engineering and Technology. Washington, DC: IEEE Computer Society, 2010: 579-581.[9]CAMENISCH J, STADLER M. Efficient group signature schemes for large groups[C] // Proceedings of CRYPTO 1997, LNCS 1294. Berlin: Springer, 1997: 410-424.[10]BELLARE M, MICCIANCIO D, WARINSCHI B. Foundations of group signatures: Formal definitions, simplified requirements and a construction based on general assumptions[C] // Proceedings of EUROCRYPT 2003, LNCS 2656.Berlin: Springer, 2003: 614-629.[11]BRESSON E, STERN J, SZYDLO M. Threshold ring signatures and applications to Ad-Hoc groups[C]// Proceedings of CRYPTO 2002. London: Springer,2002: 465-480.[12]XIONG H, QIN Z G, LI F G, et al. Identity-based threshold ring signature without pairings[C] // ICCCAS 2008: Proceedings of the International Conference on Communications, Circuits and Systems. Washington, DC: IEEE Computer Society, 2008: 478-482.[13]WANG H Q, HAN S J. A provably secure threshold ring signature scheme in certificateless cryptography[C] // ISME 2010: Proceedings of the International Conference on Information Science and Management Engineering. Washington, DC: IEEE Computer Society, 2010:105-108.[14]MELCHOR C A, CAYREL P L, GABORIT P. A new efficient threshold ring signature scheme based on coding theory[C]// PQCrypto 2008: Proceedings of the 2nd International Workshop on Post-Quantum Cryptography, LNCS 5299. Berlin: Springer,2008: 1-16.[15]BONEH D, BOYEN X, GOH E J. Hierarchical identity based encryption with constant size ciphertext[C]// Proceedings of EUROCRYPT 2005, LNCS 3494. Berlin: Springer, 2005: 440-456. |