共 16 条
- [1] Zhang Y., Jiguo L.I., Wang Z., Et al., A new efficient certificate-based signature scheme, Chinese Journal of Electronics, 24, 4, pp. 776-782, (2015)
- [2] Wu T.Y., Tsai T.T., Tseng Y.M., A revocable ID-based signcryption scheme, Journal of Information Hiding & Multimedia Signal Processing, 3, 3, pp. 240-251, (2011)
- [3] Shamir A., Identity-based cryptosystems and signature schemes, Advances in Cryptology, pp. 47-53, (1984)
- [4] Chen Y.C., Tso R., Susilo W., Et al., Certificateless signatures: Structural extensions of security models and new provably secure schemes
- [5] Tso R., Huang X., Susilo W., Strongly secure certificateless short signatures, Journal of Systems & Software, 85, 6, pp. 1409-1417, (2012)
- [6] Huang X., Susilo W., Mu Y., Et al., On the security of certificateless signature schemes from asiacrypt 2003, Cryptology and Network Security, pp. 13-25, (2005)
- [7] Choi K.Y., Park J.H., Dong H.L., A new provably secure certificateless short signature scheme, Computers & Mathematics with Applications, 61, 7, pp. 1760-1768, (2011)
- [8] Chen Y.C., Tso R., Horng G., Et al., S certificateless short signature scheme, Journal of Information Hiding & Multimedia Signal Processing, 4, 3, pp. 147-154, (2013)
- [9] Xiong H., Guan Z., Chen Z., Et al., An efficient certificateless aggregate signature with constant pairing computations, Information Sciences, 219, 10, pp. 225-235, (2013)
- [10] He D., Tian M., Chen J., Insecurity of an efficient certificateless aggregate signature with constant pairing computations, Information sciences, 268, 2, pp. 458-462, (2014)