[1]CHAUM D. Blind signatures for untraceable payments [C]// Proceedings of Crypto '82. New York: Plenum Press, 1983:199-203.[2]ABE M, FUJISAKI E. How to date blind signatures[C]// Proceedings of Asiacrypto '96, LNCS 1163. Berlin: Springer-Verlag, 1996: 244-251.[3]SHAMIR A. Identity-based cryptosystems and signature schemes [C]// Proceedings of Crypto '84. Berlin: Springer-Verlag, 1984: 47-53.[4]BONEH D, FRANKLIN M. Identity-based encryption from the Weil pairing[C]// Proceedings of Crypto '01, LNCS 2139, Berlin: Springer-Verlag, 2001: 213-229.[5]CHOW S, HUI L, YIU S. Two improved partially blind signature schemes from bilinear pairings[C]// Proceedings of ACISP '05, LNCS 3574. Berlin: Springer-Verlag, 2005: 316-328.[6]CHEN X, ZHANG F, LIU S. ID-based restrictive partially blind signatures and applications[J]. Journal of System and Software, 2007, 80(2):164-171.[7]崔巍,辛阳,胡程瑜,等. 高效的基于身份的(受限)部分盲签名[J]. 北京邮电大学学报, 2008, 31(4): 53-57.[8]李明祥,赵秀明,王洪涛. 对一种部分盲签名方案的安全性分析与改进[J]. 计算机应用, 2010, 30(10): 2687-2690.[9]CACHIN C, CAMENISCH J. Short signatures without random oracles[C]// Proceedings of Eurocrypt '04, LNCS 3027. Berlin: Springer-Verlag, 2004: 56-73.[10]POINTCHEVAL D, STERN J. Security arguments for digital signatures and blind signatures[J]. Journal of Cryptology, 2000, 13(3): 361-396.[11]何俊杰,王娟,祁传达. 安全高效的基于身份的部分盲签名方案[J]. 计算机应用, 2012, 32(5): 1388-1391.[12]闫东升. 一个新的高效的基于身份的部分盲签名方案[J]. 计算机工程与应用, 2008, 44(2): 137-139. |