[1]BONEH D, GENTRY C, LYNN B, et al. Aggregate and verifiably encrypted signatures from bilinear maps [C]// EUROCRYPT’03: Proceedings of the 22nd International Conference on Theory and Applications of Cryptographic Techniques. Berlin: Springer-Verlag, 2003: 416-432.[2]GENTRY C, RAMZAN Z. Identity-based aggregate signatures [C]// Proceedings of Public Key Cryptography 2006. Berlin: Springer-Verlag, 2006: 257-273. [3]WEN Y L, MA J F. An aggregate signature scheme with constant pairing operations [C]// Proceedings of 2008 International Conference on Computer Science and Software Engineering. Piscataway: IEEE Press, 2008: 830-833.[4]SELVI S S D, VIVEK S S, SHRIRAM J, et al. Security analysis of aggregate signature and batch verification signature schemes [EB/OL]. [2012-12-20]. http://eprint.iacr.org/2009/290.pdf.[5]WANG Z, WU Q, YE D F, et al. Practical identity-based signature scheme from bilinear maps [J]. Journal of Shanghai Jiaotong University, 2008, 13(6):684-687.[6]ZHENG Y. Digital signcryption or how to achieve cost(signature & encryption)<<cost(signature)+cost(encryption) [C]// Proceedings of Advances in Cryptology 1997, LNCS 1294. Berlin: Springer-Verlag, 1997: 165-179.[7]DIFFIE W, HELLMAN M E. New directions in cryptography [C]// Proceedings of the 1976 IEEE Transactions on Information. Piscataway: IEEE Press, 1976: 644-654.[8]SELVI S S D, VIVEK S S, SHRIRAM J, et al, Identity based aggregate signcryption schemes [C]// INDOCRYPT’09: Proceedings of the 10th International Conference on Cryptology in India: Progress in Cryptology. Berlin: Springer-Verlag, 2009: 378-397.[9]ZHANG L, ZHANG F T. A new certificateless aggregate signature scheme [J]. Computer Communications, 2009,32(6): 1079-1085.[10]REN X Y, ZHENG H Q, GENG Y. Provably secure aggregate signcryption schemes [J]. ETRI Journal, 2012, 34(3): 421-428.[11]SELVI S S D, VIVEK S S,RANGAN C P, et al. Cryptanalysis of Li et al.'s identity-based threshold signcryption scheme [C]// Proceedings of 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing. Washington, DC: IEEE Computer Society, 2008: 127-32.[12]蔡伟艺,杨晓元,韩益亮,等.可公开验证的高效无证书签密方案[J].计算机工程,2011,37(17):108-110.[13]王星, 钱海峰.高效的无证书签密方案[J].计算机工程与应用,2011,47(20):62-64.[14]王珏,张敏清,杨晓元.基于运动矢量分量差的视频隐写算法[J].计算机工程,2011,37(23):135-137. |