1 |
BEN-SASSON E, CHIESA A, GARMAN C, et al. Zerocash: decentralized anonymous payments from bitcoin[C]// Proceedings of the 2014 IEEE Symposium on Security and Privacy. Piscataway: IEEE, 2014: 459-474. 10.1109/sp.2014.36
|
2 |
杨亚涛,蔡居良,张筱薇,等. 基于SM9算法可证明安全的区块链隐私保护方案[J]. 软件学报, 2019, 30(6):1692-1704.
|
|
YANG Y T, CAI J L, ZHANG X W, et al. Privacy preserving scheme in block chain with provably secure based on SM9 algorithm[J]. Journal of Software, 2019, 30(6):1692-1704.
|
3 |
高峰,毛洪亮,吴震,等. 轻量级比特币交易溯源机制[J]. 计算机学报, 2018, 41(5):989-1004. 10.11897/SP.J.1016.2018.00989�
|
|
GAO F, MAO H L, WU Z, et al. Lightweight transaction tracing technology for bitcoin[J]. Chinese Journal of Computers, 2018, 41(5):989-1004. 10.11897/SP.J.1016.2018.00989�
|
4 |
魏松杰,李莎莎,王佳贺. 基于身份密码系统和区块链的跨域认证协议[J]. 计算机学报, 2021, 44(5):908-920. 10.11897/SP.J.1016.2021.00908
|
|
WEI S J, LI S S, WANG J H. A cross-domain authentication protocol by identity-based cryptography on consortium blockchain[J]. Chinese Journal of Computers, 2021, 44(5):908-920. 10.11897/SP.J.1016.2021.00908
|
5 |
LI Y N, YANG G M, SUSILO W, et al. Traceable Monero: anonymous cryptocurrency with enhanced accountability[J]. IEEE Transactions on Dependable and Secure Computing, 2021, 18(2):679-691. 10.1109/tdsc.2019.2910058
|
6 |
GIRAULT M. Self-certified public keys[C]// Proceedings of the 1991 Workshop on the Theory and Application of Cryptographic Techniques, LNCS 547. Berlin: Springer, 1991: 490-497.
|
7 |
AL-RIYAMI S S, PATERSON K G. Certificateless public key cryptography[C]// Proceedings of the 2003 International Conference on the Theory and Application of Cryptology and Information Security, LNCS 2894. Berlin: Springer, 2003:452-473.
|
8 |
魏爽,江荣旺. 一种无证书签名方案的分析和改进[J]. 软件, 2021, 42(1):29-31, 58. 10.3969/j.issn.1003-6970.2021.01.009
|
|
WEI S, JIANG R W. Analysis and improvement of a certificateless signature scheme[J]. Computer Engineering and Software, 2021, 42(1):29-31, 58. 10.3969/j.issn.1003-6970.2021.01.009
|
9 |
程朝辉. 基于SM2的无证书加密算法[J]. 密码学报, 2021, 8(1): 87-95.
|
|
CHENG Z H. Certificateless public key encryption based on SM2[J]. Journal of Cryptologic Research, 2021, 8(1): 87-95.
|
10 |
CHENG Z H, CHEN L Q. Certificateless public key signature schemes from standard algorithms[C]// Proceedings of the 2018 International Conference on Information Security Practice and Experience, LNCS 11125. Cham: Springer, 2018: 179-197.
|
11 |
侯红霞,杨波,张丽娜,等. 安全的两方协作SM2签名算法[J]. 电子学报, 2020, 48(1):1-8. 10.3969/j.issn.0372-2112.2020.01.001
|
|
HOU H X, YANG B, ZHANG L N, et al. Secure two-party SM2 signature algorithm[J]. Acta Electronica Sinica, 2020, 48(1):1-8. 10.3969/j.issn.0372-2112.2020.01.001
|
12 |
CHEN Y, ZHAO Y, XIONG H, et al. A certificateless strong designated verifier signature scheme with non-delegatability[J]. International Journal of Network Security, 2017, 19(4): 573-582.
|
13 |
杨龙海,王学渊,蒋和松. 改进SM2签名方法的区块链数字签名方案[J]. 计算机应用, 2021, 41(7):1983-1988.
|
|
YANG L H, WANG X Y, JIANG H S. Blockchain digital signature scheme with improved SM2 signature method[J]. Journal of Computer Applications, 2021, 41(7):1983-1988.
|
14 |
SHAMIR A. Identity-based cryptosystems and signature schemes[C]// Proceedings of the 1984 Workshop on the Theory and Application of Cryptographic Techniques, LNCS 196. Berlin: Springer, 1985: 47-53.
|
15 |
BONEH D, FRANKLIN M. Identity-based encryption from the Weil pairing[C]// Proceedings of the 2001 Annual International Cryptology Conference, LNCS 2139. Berlin: Springer, 2001: 213-229.
|
16 |
SAKAI R, OHGISHI K, KASAHARA M. Cryptosystems based on pairing[C]// Proceedings of the 2000 Symposium on Cryptography and Information Security. Okinawa: [s.n.], 2000:26-28.
|
17 |
CHOON J C, CHEON J H. An identity-based signature from gap Diffie-Hellman groups[C]// Proceedings of the 2003 International Workshop on Public Key Cryptography, LNCS 2567. Berlin: Springer, 2003: 18-30.
|
18 |
LIN C Y, WU T C, ZHANG F G. A structured multisignature scheme from the gap Diffie-Hellman group[EB/OL]. [2020-08-10]..
|
19 |
BARRETO P S L M, NAEHRIG M. Pairing-friendly elliptic curves of prime order[C]// Proceedings of the 2005 International Workshop on Selected Areas in Cryptography, LNCS 3897. Berlin: Springer, 2006: 319-331.
|
20 |
李艳琼,李继国,张亦辰. 标准模型下安全的无证书签名方案[J]. 通信学报, 2015, 36(4):186-194. 10.11959/j.issn.1000-436x.2015098
|
|
LI Y Q, LI J G, ZHANG Y C. Certificateless signature scheme without random oracles[J]. Journal on Communications, 2015, 36(4): 186-194. 10.11959/j.issn.1000-436x.2015098
|