| 1 | RIVEST R L, SHAMIR A, TAUMAN Y. How to leak a secret [C]// Proceedings of the 2001 International Conference on the Theory and Application of Cryptology and Information Security, LNCS 2248. Berlin: Springer, 2001: 552-565. | 
																													
																						| 2 | LIU J K, WEI V K, WONG D S. Linkable spontaneous anonymous group signature for ad hoc groups[C]// Proceedings of the 2004 Australasian Conference on Information Security and Privacy, LNCS 3108. Berlin: Springer, 2004: 325-335. | 
																													
																						| 3 | ODOOM J, HUANG X, ZHOU Z, et al. Linked or unlinked: a systematic review of linkable ring signature schemes [J]. Journal of Systems Architecture, 2023, 134: No.102786. | 
																													
																						| 4 | LI W, LIN Z, CHEN Q. A hybrid design of linkable ring signature scheme with stealth addresses[J]. Security and Communication Networks, 2022, 2022: No.1417607. | 
																													
																						| 5 | LI P, LAI J, WU Y. Event-oriented linkable and traceable anonymous authentication and its application to voting [J]. Journal of Information Security and Applications, 2021, 60: No.102865. | 
																													
																						| 6 | CAI Y, ZHANG H, FANG Y. A conditional privacy protection scheme based on ring signcryption for vehicularad hoc networks[J]. IEEE Internet of Things Journal, 2021, 8(1): 647-656. | 
																													
																						| 7 | SHAMIR A. Identity-based cryptosystems and signature schemes[C]// Advances in Cryptology: Proceedings of the CRYPTO'84, LNCS 196. Berlin: Springer, 1985: 47-53. | 
																													
																						| 8 | ZHANG F, KIM K. ID-based blind signature and ring signature from pairings [C]// Proceedings of the 2002 International Conference on the Theory and Application of Cryptology and Information Security, LNCS 2501. Berlin: Springer, 2002: 533-547. | 
																													
																						| 9 | LIN C Y, WU T C. An identity-based ring signature scheme from bilinear pairings[C]// Proceedings of the 18th International Conference on Advanced Information Networking and Applications — Volume 2. Piscataway: IEEE, 2004, 2: 182-185. | 
																													
																						| 10 | HERRANZ J, SÁEZ G. New identity-based ring signature schemes[C]// Proceedings of the 2004 International Conference on Information and Communications Security, LNCS 3269. Berlin: Springer, 2004: 27-39. | 
																													
																						| 11 | CHOW S S M, YIU S M, HUI L C K. Efficient identity based ring signature[C]// Proceedings of the 2005 International Conference on Applied Cryptography and Network Security, LNCS 3531. Berlin: Springer, 2005: 499-512. | 
																													
																						| 12 | AWASTHI A K, LAL S. ID-based ring signature and proxy ring signature schemes from bilinear pairings [J]. International Journal of Network Security, 2017,4(2): 1887-192. | 
																													
																						| 13 | CHOW S S M, SUSILO W, YUEN T H. Escrowed linkability of ring signatures and its applications [C]// Proceedings of the 2006 International Conference on Cryptology in Vietnam, LNCS 4341. Berlin: Springer, 2006: 175-192. | 
																													
																						| 14 | AU M H, LIU J K, SUSILO W, et al. Constant-size ID-based linkable and revocable-iff-linked ring signature [C]// Proceedings of the 2006 International Conference on Cryptology in India, LNCS 4329. Berlin: Springer, 2006: 364-378. | 
																													
																						| 15 | 袁峰,程朝辉. SM9标识密码算法综述[J]. 信息安全研究, 2016, 2(11):1008-1027. | 
																													
																						|  | YUAN F, CHENG Z H. Overview on SM9 identity-based cryptographic algorithm[J]. Journal of Information Security Research, 2016, 2(11): 1008-1027. | 
																													
																						| 16 | 殷明. 基于标识的密码算法SM9研究综述[J]. 信息技术与信息化, 2020(5):88-93. | 
																													
																						|  | YIN M. Summary of the research on identity-based cryptographic algorithm SM9[J]. Information Technology and Informatization, 2020(5): 88-93. | 
																													
																						| 17 | 闻庆峰,杨文捷,张永强. SM9及其PKI在电子政务邮件系统中的应用[J]. 计算机应用与软件, 2017, 34(4):105-109. | 
																													
																						|  | WEN Q F, YANG W J, ZHANG Y Q. Application of SM9 and PKI in e-government e-mail system[J]. Computer Applications and Software, 2017, 34(4): 105-109. | 
																													
																						| 18 | 马晓婷,马文平,刘小雪. 基于区块链技术的跨域认证方案[J]. 电子学报, 2018, 46(11):2571-2579. | 
																													
																						|  | MA X T, MA W P, LIU X X. A cross domain authentication scheme based on blockchain technology[J]. Acta Electonica Sinica, 2018, 46(11): 2571-2579. | 
																													
																						| 19 | 邱帆,胡凯雨,左黎明,等. 基于国密SM9的配电网分布式控制身份认证技术[J]. 计算机应用与软件, 2020, 37(9):291- 295, 327. | 
																													
																						|  | QIU F, HU K Y, ZUO L M, et al. Distributed control identity authentication technology based on SM9 [J]. Computer Applications and Software, 2020, 37(9): 291-295, 327. | 
																													
																						| 20 | 杨平,范苏洪,朱艳. 基于商密SM9算法的物联网安全平台设计与应用[J]. 通信技术, 2020, 53(3):738-743. | 
																													
																						|  | YANG P, FAN S H, ZHU Y. Design and application of IoT security platform based on SM9 algorithm [J]. Communications Technology, 2020, 53(3): 738-743. | 
																													
																						| 21 | AU M H, LIU J K, SUSILO W, et al. Secure ID-based linkable and revocable-iff-linked ring signature with constant-size construction [J]. Theoretical Computer Science, 2013, 469: 1-14. | 
																													
																						| 22 | DENG L, JIANG Y, NING B. Identity-based linkable ring signature scheme [J]. IEEE Access, 2019, 7: 153969-153976. | 
																													
																						| 23 | ODOOM J, HUANG X, WANG L. Stateless forward-secure key-insulated linkable ring signature scheme in ID-based setting [J]. Journal of Systems Architecture, 2022, 129: No.102600. | 
																													
																						| 24 | LIANG W, YOU L, HU G. LRS_PKI: a novel blockchain-based PKI framework using linkable ring signatures[J]. Computer Networks, 2023, 237: No.110043. | 
																													
																						| 25 | 彭聪,何德彪,罗敏,等. 基于SM9标识密码算法的环签名方案[J]. 密码学报, 2021, 8(4):724-734. | 
																													
																						|  | PENG C, HE D B, LUO M, et al. An identity-based ring signature scheme for SM9 algorithm [J]. Journal of Cryptologic Research, 2021, 8(4): 724-734. | 
																													
																						| 26 | LIU S, CHEN K, LIU Z, et al. Secure threshold ring signature based on SM9 [J]. IEEE Access, 2021, 9: 95507-95516. | 
																													
																						| 27 | 包嘉斌. 基于SM9标识密码算法的环签密方案设计及其应用研究[D]. 武汉:武汉大学, 2022:17-44. | 
																													
																						|  | BAO J B. Identity-based ring signcryption scheme based on SM9 algorithm[D]. Wuhan: Wuhan University, 2022:17-44. | 
																													
																						| 28 | 饶金涛,崔喆. 基于SM9盲签名与环签名的安全电子选举协议[J].计算机工程, 2023, 49(6):13-23, 33. | 
																													
																						|  | RAO J T, CUI Z. Secure e-voting protocol based on SM9 blind signature and ring signature [J]. Computer Engineering, 2023, 49(6): 13-23, 33. | 
																													
																						| 29 | 安浩杨,何德彪,包子健,等. 基于SM9数字签名的环签名及其在区块链隐私保护中的应用[J]. 计算机研究与发展, 2023, 60(11):2545-2554. | 
																													
																						|  | AN H Y, HE D B, BAO Z J, et al. Ring signature based on the SM9 digital signature and its application in blockchain privacy protection [J]. Journal of Computer Research and Development, 2023, 60(11): 2545-2554. | 
																													
																						| 30 | LIN C, HE D, HUANG X, et al. Blockchain-based system for secure outsourcing of bilinear pairings [J]. Information Sciences, 2020, 527: 590-601. | 
																													
																						| 31 | LIU J K, WONG D S. Linkable ring signature: security models and new schemes[C]// Proceedings of the 2005 International Conference on Computational Science and Its Applications, LNCS 3481. Berlin: Springer, 2005: 614-623. | 
																													
																						| 32 | 汤永利,夏菲菲,叶青,等. 格上基于身份的可链接环签名[J]. 密码学报, 2021, 8(2):232-247. | 
																													
																						|  | TANG Y L, XIA F F, YE Q, et al. Identity-based linkable ring signature on lattice [J]. Journal of Cryptologic Research, 2021, 8(2): 232-247. | 
																													
																						| 33 | PEREIRA G C C F, SIMPLÍCIO M A, Jr, NAEHRIG M, et al. A family of implementation-friendly BN elliptic curves [J]. Journal of Systems and Software, 2011, 84(8): 1319-1326. | 
																													
																						| 34 | HE D, ZEADALLY S, KUMAR N, et al. Efficient and anonymous mobile user authentication protocol using self-certified public key cryptography for multi-server architectures [J]. IEEE Transactions on Information Forensics and Security, 2016, 11(9): 2052-2064. |