[1]AL-RIYAMI S S, PATERSON K G. Certificateless public key cryptography [C]// ASIACRYPT 2003: Proceedings of the 9th International Conference on the Theory and Application of Cryptology and Information Security. Berlin: Springer, 2003: 452-473.
[2]ZHANG L, ZHANG F. A method to construct a class of certificateless signature schemes [J]. Chinese Journal of Computers, 2009, 32(5): 940-945.(张磊,张福泰.一类无证书签名方案的构造方法[J].计算机学报,2009,32(5):940-945.)
[3]WEI C, CAI X. New certificateless proxy blind signature scheme [J]. Journal of Computer Applications,2010, 30(12): 3343-3345.(魏春艳,蔡晓秋.新的无证书代理盲签名方案[J].计算机应用,2010,30(12):3343-3345.)
[4]HONG D, XIE Q. Efficient certificateless signature scheme [J]. Journal of Computer Applications, 2010, 30(7): 1809-1811.(洪东招,谢琪.有效的无证书签名方案[J].计算机应用,2010,30(7):1809-1811.)
[5]TSO R, KIM C, YI X. Certificateless message recovery signatures providing Girault's level-3 security [J]. Journal of Shanghai Jiaotong University: Science, 2011, 16(5): 577-583.
[6]HUANG X, MU Y, SUSILO W, et al. Certificateless signatures: new schemes and security models [J]. The Computer Journal, 2004, 55(4): 457-474.
[7]HU B C, WONG D S, ZHANG Z, et al. Key replacement attack against a generic construction of certificateless signature [C]// ACISP 2006: Proceedings of the 11th Australasian Conference on Information Security and Privacy, LNCS 4058. Berlin: Springer, 2006: 235-246.
[8]ZHANG Y, WANG L. New DLP-based certificateless signature scheme [J]. Computer Engineering and Applications, 2011, 47(12): 62-64.(张燕燕,王亮亮.新型的基于DLP的无证书签名方案[J].计算机工程与应用,2011,47(12):62-64.)
[9]YANG B, XIAO Z, LI S, et al. Analysis and improvement of certificateless signature scheme [J]. Computer Engineering, 2012, 38(9): 15-18.(杨波,肖自碧,李寿贵,等.一种无证书签名方案的分析与改进[J].计算机工程,2012,38(9):15-18.)
[10]WANG S, LIU W, XIE Q. Certificateless signature scheme without bilinear pairings [J]. Journal on Communications, 2012, 33(4):93-98.(王圣宝,刘文浩,谢琪.无双线性配对的无证书签名方案[J].通信学报,2012,33(4):93-98.)
[11]WANG Y, DU W. Security analysis and improvement of certifi-cateless signature scheme without bilinear pairing [J]. Journal of Computer Applications, 2013, 33(8): 2250-2252.(王怡,杜伟章.无双线性对的无证书签名方案的分析及改进[J].计算机应用,2013,33(8):2250-2252.)
[12]KIPNIS A, SHAMIA A. Cryptanalysis of the HFE public key cryptosystem by relinearization [C]// CRYPTO'99: Proceedings of the 19th Annual International Cryptology Conference Advances in Cryptology, LNCS 1666. Berlin: Springer, 1999: 19-30.
[13]COURTOI N, KLIMOV A, PATARIN J. Efficient algorithms for solving overdefined systems of multivariate polynomial equations [C]// EUROCRYPT 2000: Proceedings of the 2000 International Conference on the Theory and Application of Cryptographic Techniques, LNCS 1807. Berlin: Springer, 2000: 392-407. |