共 18 条
[11]
Chow S., Yiu S., Hui L., Efficient identity based ring signature, Applied Cryptography and Network Security-ACNS'05, LNCS3531, pp. 499-512, (2005)
[12]
Nguyen L., Accumulators from bilinear pairings and applications to ID-based ring signatures and group membership revocation, Topics in Cryptology-CT-RSA'05, LNCS3376, pp. 275-292, (2005)
[13]
Cao T., Lin D., Xue R., ID-based ring authenticated encryption, Proceedings of the 19th International Conference on Advanced Information Networking and Applications, pp. 591-596, (2005)
[14]
Fabien L., Vergnaud D., Multi-designated verifiers signatures, Proceedings of International Conference on Information and Communications Security (ICICS 2004), LNCS3269, pp. 495-507, (2004)
[15]
Cocks C., An identity based encryption scheme based on quadratic residues, Cryptography and Coding Lecture Notes in Computer Science, LNCS2260, pp. 360-364, (2001)
[16]
Herranz J., Saez G., Forking lemmas for ring signature schemes, Proceedings of INDOCRYPT, LNCS2904, pp. 266-279, (2003)
[17]
Pointcheval D., Stern J., Security arguments for digital signatures and blind signatures, Journal of Cryptology, 13, 3, pp. 361-369, (2000)
[18]
Barreto P.S.L.M., Lynn B., Scott M., On the selection of pairing-friendly groups, SAC 2004, Lecture Notes in Computer Science, pp. 17-25, (2004)