[1] KALYANI D, SRIDEVI R. Survey on identity based and hierarchical identity based encryption schemes[J]. International Journal of Computer Applications, 2016, 134(14):32-37. [2] 田俊峰,孙可辉.基于HIBC的云信任分散统一认证机制[J].计算机研究与发展,2015,52(7):16660-16671.(TIAN J F, SUN K H. Trust distributed based authentication mechanism using hierarchical identity based cryptography[J]. Journal of Computer Research and Development, 2015, 52(7):16660-16671.) [3] FIDA M R, ALI M, ADNAN A, et al. Region based security architecture for DTN[C]//Proceedings of the 2011 Eighth International Conference on Information Technology:New Generations. Piscataway, NJ:IEEE, 2011:387-392. [4] ZHU H J, LIN X D, LU R X, et al. An opportunistic batch bundle authentication scheme for energy constrained DTNs[C]//Proceedings of the 2010 IEEE Conference on Computer Communications. Piscataway, NJ:IEEE, 2010:1-9. [5] 徐国愚,陈性元,杜学绘.大规模延迟容忍网络中基于分级身份签名的认证方案研究[J].电子与信息学报,2013,35(11):2615-2622.(XU G Y, CHEN X Y, DU X H. An authentication scheme using hierarchical identity based signature in large-scale delay tolerant networks[J]. Journal of Electronics & Information Technology, 2013, 35(11):2615-2622.) [6] NOISTERNIG M, HOLLICK M. Efficient solutions for the authenticated fragmentation problem in delay- and disruption-tolerant networks[C]//Proceedings of the 17th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems. New York:ACM, 2014:177-185. [7] LAW L, MATT B J. Finding invalid signatures in pairing based batches[C]//Proceedings of the Eleventh IMA International Conference on Cryptography and Coding. Berlin:Springer, 2007:35-53. [8] LEE S, CHO S, CHOI J, et al. Batch verification with DSA-type digital signatures for ubiquitous computing[C]//Proceedings of the 2005 International Conference on Computational and Information Science. Berlin:Springer, 2005:125-130. [9] MATT B J. Identification of multiple invalid signatures in pairing-based batched signatures[C]//Proceedings of the 2009 International Workshop on Public Key Cryptography. Berlin:Springer, 2009:337-356. [10] MATT B J. Identification of multiple invalid pairing-based signatures in constrained batches[C]//Proceedings of the 2010 International Conference on Pairing-Based Cryptography. Berlin:Springer, 2010:78-95. [11] WESOLOWSKI M. Batch verification of elliptic curve digital signa-tures[D]. Waterloo, Ontario:University of Waterloo, 2015:51-88. [12] AKINYELE J A, GREEN M, HOHENBERGER S, et al. Machine-generated algorithms, proofs and software for the batch verification of digital signature schemes[J]. Journal of Computer Security, 2014, 22(6):867-912. [13] ZAVERUCHA G M, STINSON D R. Group testing and batch verification[C]//Proceedings of the 2009 International Conference on Information Theoretic Security. Berlin:Springer, 2009:140-157. [14] GRANGER R, PAGE D, SMART N P. High security pairing-based cryptography revisited[C]//Proceedings of the 2006 International Algorithmic Number Theory Symposium. Berlin:Springer, 2006:480-494. |