共 15 条
[1]
Shamir A., Identity-based cryptosystems and signature schemes, Proceedings of the 1984 International Cryptology Conference (CRYPTO'1984), pp. 47-53, (1984)
[2]
Boneh D., Franklin M., Identity-based encryption from the Weil pairing, Proceedings of the 2001 International Cryptology Conference (CRYPTO' 2001), pp. 213-229, (2001)
[3]
Hess F., Efficient identity-based signature schemes based on pairings, Proceedings of the ACM Symposium on Applied Computing (SAC 2002), pp. 310-324, (2003)
[4]
Cha J.C., Cheon J.H., An identity-based signature from gap Diffie-Hellman groups, Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography (PKC'2003), pp. 18-30, (2003)
[5]
Wang S.-B., Cao Z.-F., Dong X.-L., Provably secure identity-based authenticated key agreement protocols in the standard model, Chinese Journal of Computers, 30, 10, pp. 1842-1852, (2007)
[6]
Bellare M., Rogoway P., Random oracles are practical: A paradigm for designing efficient protocols, Proceedings of the 1st ACM Conference on Computer and Communications Security (ACM CCS'1993), pp. 62-73, (1993)
[7]
Canetti R., Goldreich O., Halevi S., The random oracle methodology, revisited, Proceedings of the 30th Annual ACM Symposium on the Theory of Computing (STOC'98), pp. 209-218, (1998)
[8]
Zhou F.-C., Xu J., Wang L.-L., Et al., A group signature in the composite order bilinear groups, Chinese Journal of Computers, 35, 4, pp. 654-663, (2012)
[9]
Li J.-G., Qian N., Huang X.-Y., Zhang Y.-C., Certificate-based strong designated verifier signature scheme, Chinese Journal of Computers, 35, 8, pp. 1579-1587, (2012)
[10]
Li F.-G., Khan M.-K., A biometric identity-based signcryption scheme, Future Generation Computer Systems, 28, 1, pp. 306-310, (2012)