[1]DIFFIE W,HELLMAN M E.New directions in cryptography[J]. IEEE Transactions on Information Theory, 1976,22(6):644-654.[2]陈宁宇,顾永跟,苏晓萍.数字签名方案的同底构造攻击[J]. 计算机应用,2010,30(4):1042-1044.[3]李方伟,谭利平,邱成刚.基于离散对数的代理盲签名[J]. 电子科技大学学报,2008,37(2):172-174.[4]HARN L, REN JIAN, LIN CHANGLU. Design of DL-based certificateless digital signatures[J]. The Journal of Systems and Software,2009,82(5):789-793.[5]MAMBO M, USUDA K, OKAMOTO E. Proxy signatures: Delegation of the power to sign messages[J]. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 1996,E79-A(9):1338-1354.[6]TAN ZUOWEN, LIN ZHOUJUN, TANG CHUNMING. Digital proxy blind signature schemes based on DLP and ECDLP[J]. MM Research Preprints,2002,21(7):212-217.[7]AWASTHI A K, SUNDER L. Proxy blind signature scheme[J]. Transactions on Cryptology, 2005, 2(1): 5-11.[8]SUN H M, HSIEH B T. On the security of some proxy blind signature schemes[EB/OL]. [2010-08-20]. http://eprint.iacr.org.[9]WANG SHAOBIN,HONG FAN,CUI GUOHUA. Secure efficient proxy blind signature schemes based DLP[C]// Proceedings of the Seventh IEEE International Conferenceon E-Commerce Technology. New York: IEEE,2005:452-455.[10]AL-RIYAMI S S, PATERSON K G. Certificateless public key cryptography[C]// Cryptology-Asiacrypt 2003,LNCS 2894. Berlin: Springer-Verlag, 2003: 452-473.[11]CASTRO R, DAHAB R. Two notes on the security of certificateless signatures[C]// Proceedings of the 1st International Conference on Provable Security, LNCS 4784. Berlin: Springer-Verlag, 2007: 85-102.[12]HUANG XINYI, MU YI, SUSILO W, et al.Certificateless signature revisited[C]// Proceedings of the 12th Australasian Conference on Information Security and Privacy, LNCS 4586.Berlin: Springer-Verlag, 2007: 308-32. |