[1]SHAMIR A. Identity-based cryptosystems and signature schemes [C]// Advances in Cryptology-CRYPTO'84, LNCS 196. Berlin: Springer-Verlag, 1985: 47-53.[2]BONEH D, FRANKLIN M. Identity-Based encryption from the Weil pairing[C]// Advances in Cryptology-CRYPTO'01, LNCS 2139. Berlin: Springer-Verlag, 2001: 213-229.[3]CHAUM D. Blind signatures for untraceable payments [J]. Advances in Cryptology Proceedings of Crypto, 1983, 82(3):199-203. [4]ABE M, FUJISAKI E. How to date blind signatures[C]//Advances in Cryptology-ASIACRYPTO'96, LNCS 1163. Berlin: Springer-Verlag, 1996: 244-251.[5]CHOW S, HUI L, YIU S. Two improved partially blind signature schemes from bilinear pairings[C]// Advances in Cryptology-ASIACRYPTO'05, LNCS 3788, Berlin: Springer-Verlag, 2005: 316-328.[6]CHEN X, ZHANG F, LIU S. ID-based restrictive partially blind signatures and applications[J]. Journal of System and Software, 2007, 80(2):164-171.[7]崔巍, 辛阳, 胡程瑜,等. 高效的基于身份的(受限) 部分盲签名[J]. 北京邮电大学学报, 2008, 31(4): 53-57.[8]李明祥, 赵秀明, 王洪涛. 对一种部分盲签名方案的安全性分析与改进[J]. 计算机应用, 2010, 30(10): 2687-2690.[9]闫东升. 一个新的高效的基于身份的部分盲签名方案[J]. 计算机工程与应用, 2008, 44(2):137-139.[10]李明祥, 郑艳娟, 安文广. 一种高效的基于身份的部分盲签名方案[J]. 计算机应用研究, 2010, 27(11): 4299-4302.[11]SHIM K A. An ID-based aggregate signature scheme with constant pairing computations[J]. The Journal of Systems and Software, 2010, 83(10): 1873-1880.[12]POINTCHEVAL D, STERN J. Security arguments for digital signatures and blind signatures[J]. Journal of Cryptology, 2000, 13(3): 361-396. |