共 17 条
- [1] Asokan N., Schunter M., Waidner M., Optimistic protocols for fair exchange, Proc of the 4th ACM Conf on Information Security and Privacy, pp. 7-17, (1997)
- [2] Boneh D., Gentry C., Lynn B., Et al., Aggregate and verifiably encrypted signatures from bilinear maps[G], LNCS 2656: Proc of Eurocrypt 2003, pp. 416-432, (2003)
- [3] Zhou Y., Sun Y., Qing S., Et al., An efficient id-based verifiably encrypted signature scheme, Journal of Computer Research and Development, 48, 8, pp. 1350-1356, (2011)
- [4] Shen J., Wang J., Zheng Y., Et al., A novel verifiably encrypted signature from weil pairing, Proc of HumanCom and EMC 2013, pp. 603-607, (2014)
- [5] Calderon T., Meiklejohn S., Shacham H., Et al., Rethinking verifiably encrypted signatures: A gap in functionality and potential solutions[G], LNCS 8366: Proc of CT-RSA 2014, pp. 349-366, (2014)
- [6] Shim K.A., On the security of verifiably encrypted signature schemes in a multi-user setting, Annals of Telecommunications, 69, 11, pp. 585-591, (2014)
- [7] Nishimaki R., Xagawa K., Verifiably encrypted signatures with short keys based on the decisional linear problem and obfuscation for encrypted VES, Designs, Codes and Cryptography, 77, 1, pp. 61-98, (2015)
- [8] Gentry C., Peikert C., Vaikuntanathan V., How to use a short basis: Trapdoors for hard lattice and new cryptographic constructions, Proc of the 40th Annual Symp on Theory of Computing, pp. 197-206, (2008)
- [9] Alwen J., Peikert C., Generating shorter bases for hard random lattices, Theory of Computing Systems, 48, 3, pp. 535-553, (2011)
- [10] Gordon S.D., Katz J., Vaikuntanathan V., A group signature scheme from lattice assumptions[G], LNCS 6477: Proc of Asiacrypt 2010, pp. 395-412, (2010)