1 |
RIVEST R L, SHAMIR A, TAUMAN Y. How to leak a secret [C]// Proceedings of the 2001 International Conference on the Theory and Application of Cryptology and Information Security, LNCS 2248. Berlin: Springer, 2001: 552-565.
|
2 |
LIU J K, WEI V K, WONG D S. Linkable spontaneous anonymous group signature for ad hoc groups[C]// Proceedings of the 2004 Australasian Conference on Information Security and Privacy, LNCS 3108. Berlin: Springer, 2004: 325-335.
|
3 |
ODOOM J, HUANG X, ZHOU Z, et al. Linked or unlinked: a systematic review of linkable ring signature schemes [J]. Journal of Systems Architecture, 2023, 134: No.102786.
|
4 |
LI W, LIN Z, CHEN Q. A hybrid design of linkable ring signature scheme with stealth addresses[J]. Security and Communication Networks, 2022, 2022: No.1417607.
|
5 |
LI P, LAI J, WU Y. Event-oriented linkable and traceable anonymous authentication and its application to voting [J]. Journal of Information Security and Applications, 2021, 60: No.102865.
|
6 |
CAI Y, ZHANG H, FANG Y. A conditional privacy protection scheme based on ring signcryption for vehicularad hoc networks[J]. IEEE Internet of Things Journal, 2021, 8(1): 647-656.
|
7 |
SHAMIR A. Identity-based cryptosystems and signature schemes[C]// Advances in Cryptology: Proceedings of the CRYPTO'84, LNCS 196. Berlin: Springer, 1985: 47-53.
|
8 |
ZHANG F, KIM K. ID-based blind signature and ring signature from pairings [C]// Proceedings of the 2002 International Conference on the Theory and Application of Cryptology and Information Security, LNCS 2501. Berlin: Springer, 2002: 533-547.
|
9 |
LIN C Y, WU T C. An identity-based ring signature scheme from bilinear pairings[C]// Proceedings of the 18th International Conference on Advanced Information Networking and Applications — Volume 2. Piscataway: IEEE, 2004, 2: 182-185.
|
10 |
HERRANZ J, SÁEZ G. New identity-based ring signature schemes[C]// Proceedings of the 2004 International Conference on Information and Communications Security, LNCS 3269. Berlin: Springer, 2004: 27-39.
|
11 |
CHOW S S M, YIU S M, HUI L C K. Efficient identity based ring signature[C]// Proceedings of the 2005 International Conference on Applied Cryptography and Network Security, LNCS 3531. Berlin: Springer, 2005: 499-512.
|
12 |
AWASTHI A K, LAL S. ID-based ring signature and proxy ring signature schemes from bilinear pairings [J]. International Journal of Network Security, 2017,4(2): 1887-192.
|
13 |
CHOW S S M, SUSILO W, YUEN T H. Escrowed linkability of ring signatures and its applications [C]// Proceedings of the 2006 International Conference on Cryptology in Vietnam, LNCS 4341. Berlin: Springer, 2006: 175-192.
|
14 |
AU M H, LIU J K, SUSILO W, et al. Constant-size ID-based linkable and revocable-iff-linked ring signature [C]// Proceedings of the 2006 International Conference on Cryptology in India, LNCS 4329. Berlin: Springer, 2006: 364-378.
|
15 |
袁峰,程朝辉. SM9标识密码算法综述[J]. 信息安全研究, 2016, 2(11):1008-1027.
|
|
YUAN F, CHENG Z H. Overview on SM9 identity-based cryptographic algorithm[J]. Journal of Information Security Research, 2016, 2(11): 1008-1027.
|
16 |
殷明. 基于标识的密码算法SM9研究综述[J]. 信息技术与信息化, 2020(5):88-93.
|
|
YIN M. Summary of the research on identity-based cryptographic algorithm SM9[J]. Information Technology and Informatization, 2020(5): 88-93.
|
17 |
闻庆峰,杨文捷,张永强. SM9及其PKI在电子政务邮件系统中的应用[J]. 计算机应用与软件, 2017, 34(4):105-109.
|
|
WEN Q F, YANG W J, ZHANG Y Q. Application of SM9 and PKI in e-government e-mail system[J]. Computer Applications and Software, 2017, 34(4): 105-109.
|
18 |
马晓婷,马文平,刘小雪. 基于区块链技术的跨域认证方案[J]. 电子学报, 2018, 46(11):2571-2579.
|
|
MA X T, MA W P, LIU X X. A cross domain authentication scheme based on blockchain technology[J]. Acta Electonica Sinica, 2018, 46(11): 2571-2579.
|
19 |
邱帆,胡凯雨,左黎明,等. 基于国密SM9的配电网分布式控制身份认证技术[J]. 计算机应用与软件, 2020, 37(9):291- 295, 327.
|
|
QIU F, HU K Y, ZUO L M, et al. Distributed control identity authentication technology based on SM9 [J]. Computer Applications and Software, 2020, 37(9): 291-295, 327.
|
20 |
杨平,范苏洪,朱艳. 基于商密SM9算法的物联网安全平台设计与应用[J]. 通信技术, 2020, 53(3):738-743.
|
|
YANG P, FAN S H, ZHU Y. Design and application of IoT security platform based on SM9 algorithm [J]. Communications Technology, 2020, 53(3): 738-743.
|
21 |
AU M H, LIU J K, SUSILO W, et al. Secure ID-based linkable and revocable-iff-linked ring signature with constant-size construction [J]. Theoretical Computer Science, 2013, 469: 1-14.
|
22 |
DENG L, JIANG Y, NING B. Identity-based linkable ring signature scheme [J]. IEEE Access, 2019, 7: 153969-153976.
|
23 |
ODOOM J, HUANG X, WANG L. Stateless forward-secure key-insulated linkable ring signature scheme in ID-based setting [J]. Journal of Systems Architecture, 2022, 129: No.102600.
|
24 |
LIANG W, YOU L, HU G. LRS_PKI: a novel blockchain-based PKI framework using linkable ring signatures[J]. Computer Networks, 2023, 237: No.110043.
|
25 |
彭聪,何德彪,罗敏,等. 基于SM9标识密码算法的环签名方案[J]. 密码学报, 2021, 8(4):724-734.
|
|
PENG C, HE D B, LUO M, et al. An identity-based ring signature scheme for SM9 algorithm [J]. Journal of Cryptologic Research, 2021, 8(4): 724-734.
|
26 |
LIU S, CHEN K, LIU Z, et al. Secure threshold ring signature based on SM9 [J]. IEEE Access, 2021, 9: 95507-95516.
|
27 |
包嘉斌. 基于SM9标识密码算法的环签密方案设计及其应用研究[D]. 武汉:武汉大学, 2022:17-44.
|
|
BAO J B. Identity-based ring signcryption scheme based on SM9 algorithm[D]. Wuhan: Wuhan University, 2022:17-44.
|
28 |
饶金涛,崔喆. 基于SM9盲签名与环签名的安全电子选举协议[J].计算机工程, 2023, 49(6):13-23, 33.
|
|
RAO J T, CUI Z. Secure e-voting protocol based on SM9 blind signature and ring signature [J]. Computer Engineering, 2023, 49(6): 13-23, 33.
|
29 |
安浩杨,何德彪,包子健,等. 基于SM9数字签名的环签名及其在区块链隐私保护中的应用[J]. 计算机研究与发展, 2023, 60(11):2545-2554.
|
|
AN H Y, HE D B, BAO Z J, et al. Ring signature based on the SM9 digital signature and its application in blockchain privacy protection [J]. Journal of Computer Research and Development, 2023, 60(11): 2545-2554.
|
30 |
LIN C, HE D, HUANG X, et al. Blockchain-based system for secure outsourcing of bilinear pairings [J]. Information Sciences, 2020, 527: 590-601.
|
31 |
LIU J K, WONG D S. Linkable ring signature: security models and new schemes[C]// Proceedings of the 2005 International Conference on Computational Science and Its Applications, LNCS 3481. Berlin: Springer, 2005: 614-623.
|
32 |
汤永利,夏菲菲,叶青,等. 格上基于身份的可链接环签名[J]. 密码学报, 2021, 8(2):232-247.
|
|
TANG Y L, XIA F F, YE Q, et al. Identity-based linkable ring signature on lattice [J]. Journal of Cryptologic Research, 2021, 8(2): 232-247.
|
33 |
PEREIRA G C C F, SIMPLÍCIO M A, Jr, NAEHRIG M, et al. A family of implementation-friendly BN elliptic curves [J]. Journal of Systems and Software, 2011, 84(8): 1319-1326.
|
34 |
HE D, ZEADALLY S, KUMAR N, et al. Efficient and anonymous mobile user authentication protocol using self-certified public key cryptography for multi-server architectures [J]. IEEE Transactions on Information Forensics and Security, 2016, 11(9): 2052-2064.
|