共 18 条
[1]
Rivest R.L., Shamir A., Tauman Y., How to leak a secret, Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advance in Cryptology, pp. 552-565, (2001)
[2]
Chaum D., van Hevst E., Group signature, Proceedings of EUROCRYPT 1991, LNCS547, pp. 257-265, (1991)
[3]
Chen L., Kudla C., Paterson K., Concurrent signatures, Proceedings of EUROCRYPT 2004, pp. 287-305, (2004)
[4]
Rivest R., Shamir A., Tauman Y., How to leak a secret: Theory and applications of ring signatures, Theoretical Computer Science, Essays in Memory of Shimon Even, (2006)
[5]
Chow S., Lui R., Hui L., Et al., Identity based ring signature: Why, how and what next, Proceedings of the 2nd European Public Key Infrastructure Workshop: Research and Application, EuroPKI 2005, pp. 144-161, (2005)
[6]
Adi S., Identity-based cryptosystems and signature schemes, Proceedings of CRYPTO 84 on Advances in Cryptology, pp. 47-53, (1984)
[7]
Zhang F., Kim K., ID-based blind signature and ring signature from pairings, Proceedings of ASIACRYPT 2002, pp. 533-547, (2002)
[8]
Lin C., Wu T., An identity-based ring signature scheme from bilinear pairings, (2003)
[9]
Awasthi A., Lal S., ID-based ring signature and proxy ring signature schemes from bilinear pairings, (2004)
[10]
Javier H., Saez G., New identity-based ring signature schemes, Proceedings of the 6th International Conference on Information and Communications Security (ICICS 2004), LNCS3269, pp. 27-39, (2004)