[1] TAHAT N, ABDALLAH E E. A proxy partially blind signature approach using elliptic curve cryptosystem[J]. International Journal of Mathematics in Operational Research, 2016, 8(1):87-95. [2] CHEN L, WEN Q. Cryptanalysis and improvement of a certificateless partially blind signature[J]. IET Information Security, 2015, 9(6):380-386. [3] CHOW S S M, HUI L C K, YIU S M, et al. Two improved partially blind signature schemes from bilinear pairings[C]//Proceedings of the 10th Australasian Conference on Information Security and Privacy. Berlin:Springer, 2005:316-328. [4] 张学军, 王育民. 高效的基于身份的部分盲签名[J]. 计算机工程与应用, 2007, 43(11):211-212.(ZHANG X J, WANG Y M. Efficient identity-based partially blind signature[J]. Computer Engineering and Applications, 2007, 43(11):211-212.) [5] 闫东升. 一个新的高效的基于身份的部分盲签名方案[J]. 计算机工程与应用, 2008, 44(2):137-139.(YAN D S. Novel and efficient ID-based partially blind signature scheme[J]. Computer Engineering and Applications, 2008, 44(2):137-139.) [6] 崔巍, 辛阳, 胡程瑜,等. 高效的基于身份的(受限)部分盲签名[J]. 北京邮电大学学报, 2008, 31(4):53-57.(CUI W, XIN Y, HU C Y, et al. Efficient ID-based (restrictive) partially blind signature[J]. Journal of Beijing University of Posts and Telecommunications, 2008, 31(4):53-57.) [7] 李明祥, 杜光辉, 罗新方. 高效的无证书部分盲签名方案[J]. 计算机工程与设计, 2010, 31(22):4817-4819. (LI M X, DU G H, LUO X F. Efficient certificateless partially blind signature scheme[J]. Computer Engineering and Design, 2010, 31(22):4817-4819.) [8] 李明祥, 李峰, 王涛. 部分盲签名综述[J]. 计算机应用研究, 2012, 29(12):4437-4440.(LI M X, LI F, WANG T. Survey of partially blind signature[J]. Application Research of Computers, 2012, 29(12):4437-4440.) [9] CANETTI R, GOLDREICH O, HALEVI S. The random oracle methodology, revisited[J]. Journal of the ACM, 2004, 51(4):557-594. [10] LI F, ZHANG M, TAKAGI T. Identity-based partially blind signature in the standard model for electronic cash[J]. Mathematical and Computer Modelling, 2013, 58(1):196-203. [11] 张延红, 陈明. 标准模型下增强的基于身份部分盲签名[J]. 四川大学学报(工程科学版), 2014, 46(1):95-101.(ZHANG Y H, CHEN M. Extended identity-based partially blind signature scheme in the standard model[J]. Journal of Sichuan University(Engineering Science Edition), 2014, 46(1):95-101.) [12] ZHANG J, SUN Z. An ID-based server-aided verification short signature scheme avoid key escrow[J]. Journal of Information Science and Engineering, 2013, 29(3):459-473. [13] WU W, MU Y, SUSILO W, et al. Provably secure server-aided verification signatures[J]. Computers & Mathematics with Applications, 2011, 61(7):1705-1723. [14] WANG Z, WANG L, YANG Y, et al. Comment on Wu et al.'s server-aided verification signature schemes[J]. International Journal of Network Security, 2010, 10(2):158-160. [15] WU H, XU CX, DDENG J, et al. On the security of server-aided verification signature schemes[J]. Journal of Computational Information System, 2013, 9(4):1449-1454. |