| [1] |
RIVEST R L, SHAMIR A, TAUMAN Y. How to leak a secret[C]// Proceedings of the 2001 International Conference on the Theory and Application of Cryptology and Information Security, LNCS 2248. Berlin: Springer, 2001: 552-565.
|
| [2] |
CHAUM D, VAN HEYST E. Group signatures[C]// Proceedings of the 1991 Annual International Conference on the Theory and Application of Cryptographic Techniques, LNCS 547. Berlin: Springer, 1991: 257-265.
|
| [3] |
LIU J K, WEI V K, WONG D S. Linkable spontaneous anonymous group signature for ad hoc groups[C]// Proceedings of the 2004 Australasian Conference on Information Security and Privacy, LNCS 3108. Berlin: Springer, 2004: 325-335.
|
| [4] |
GU K, DONG X, WANG L. Efficient traceable ring signature scheme without pairings[J]. Advances in Mathematics of Communications, 2020, 14(2): 207-232.
|
| [5] |
ROMAN L F A, GONDIM P R L. Authentication protocol in CTNs for a CWD-WPT charging system in a cloud environment[J]. Ad Hoc Networks, 2020, 97: No.102004.
|
| [6] |
MU R, GONG B, NING Z, et al. An identity privacy scheme for blockchain-based on edge computing[J]. Concurrency and Computation: Practice and Experience, 2022, 34(1): No.e6545.
|
| [7] |
LI P, LAI J, WU Y. Event-oriented linkable and traceable anonymous authentication and its application to voting[J]. Journal of Information Security and Applications, 2021, 60: No.102865.
|
| [8] |
WU T, YANG G, ZHU L, et al. Privacy-preserving voluntary-tallying leader election for internet of things[J]. Information Sciences, 2021, 574: 461-472.
|
| [9] |
NOETHER S, MACKENZIE A. Ring confidential transactions[J]. Ledger, 2016, 1: 1-18.
|
| [10] |
GUO L, WANG Q, YAU W C. Online/offline rewritable blockchain with auditable outsourced computation[J]. IEEE Transactions on Cloud Computing, 2023, 11(1): 499-514.
|
| [11] |
CAI X, REN Y, ZHANG X. Privacy-protected deletable blockchain[J]. IEEE Access, 2020, 8: 6060-6070.
|
| [12] |
AL-RIYAMI S S, PATERSON K G. Certificateless public key cryptography[C]// Proceedings of the 2003 International Conference on the Theory and Application of Cryptology and Information Security, LNCS 2894. Berlin: Springer, 2003: 452-473.
|
| [13] |
徐倩,张福泰,刘志高,等. 无证书的环签名方案[J]. 计算机工程与应用, 2006, 42(2):116-120.
|
|
XU Q, ZHANG F T, LIU Z G, et al. Certificateless ring signing scheme[J]. Computer Engineering and Applications, 2006, 42(2): 116-120.
|
| [14] |
CHOW S S M, YAP W S. Certificateless ring signature[EB/OL]. [2025-04-20]..
|
| [15] |
ZHANG Y, ZENG J, LI W, et al. A certificateless ring signature scheme with high efficiency in the random oracle model[J]. Mathematical Problems in Engineering, 2017, 2017: No.7696858.
|
| [16] |
KARATI A, ISLAM S H, KARUPPIAH M. Provably secure and lightweight certificateless signature scheme for IIoT environments[J]. IEEE Transactions on Industrial Informatics, 2018, 14(8): 3701-3711.
|
| [17] |
ZHANG Y, DENG R H, ZHENG D, et al. Efficient and robust certificateless signature for data crowdsensing in cloud-assisted industrial IoT[J]. IEEE Transactions on Industrial Informatics, 2019, 15(9): 5099-5108.
|
| [18] |
DENG L, LI S, HUANG H, et al. Certificateless ring signature scheme from elliptic curve group[J]. Journal of Internet Technology, 2020, 21(3): 723-731.
|
| [19] |
朱秀萍,刘亚丽,林昌露,等. 基于椭圆曲线的高效无证书环签名方案[J]. 计算机应用, 2023, 43(11): 3368-3374.
|
|
ZHU X P, LIU Y L, LIN C L, et al. Efficient certificateless ring signature scheme based on elliptic curve[J]. Journal of Computer Applications, 2023, 43(11): 3368-3374.
|
| [20] |
汪玉,郑明辉,杨景奕,等. 基于SM2的无证书环签名方案[J]. 计算机应用, 2025, 45(8): 2437-2441.
|
|
WANG Y, ZHENG M H, YANG J Y, et al. Certificateless ring signature scheme based on SM2[J]. Journal of Computer Applications, 2025, 45(8): 2437-2441.
|
| [21] |
HERRANZ J, SÁEZ G. Forking lemmas for ring signature schemes[C]// Proceedings of the 2003 International Conference on the Theory and Application of Cryptology and Information Security, LNCS 2904. Berlin: Springer, 2003: 266-279.
|
| [22] |
ZHOU Q, ZHENG Y, CHEN M, et al. A conditionally anonymous linkable ring signature for blockchain privacy protection[J]. Computer Systems Science and Engineering, 2023, 47(3): 2851-2867.
|
| [23] |
WANG Z, FAN J. Flexible threshold ring signature in chronological order for privacy protection in edge computing[J]. IEEE Transactions on Cloud Computing, 2022, 10(2): 1253-1261.
|