[1] |
MA Chunguang, YANG Yixian.Transferable Off-Line Electronic Cash[J]Chinese Journal of Computers, 2005, 28(3): 301-308.
|
|
马春光,杨义先. 可转移离线电子现金[J]. 计算机学报,2005,28(3):301-308.
|
[2] |
LI Yuechuan.Using Virtual Phone Implementation Fraud Crime of Case Analysis[J]. Netinfo Security, 2011, 11(5): 68-70.
|
|
李粤川. 利用虚拟电话实施诈骗犯罪之案例分析[J]. 信息网络安全,2011,11(5):68-70.
|
[3] |
ZHAO Xiang.Overview of Digital Signature[J]. Computer Engineering and Design, 2006, 27(2): 195-197.
|
|
赵翔. 数字签名综述[J]. 计算机工程与设计,2006,27(2):195-197.
|
[4] |
HAO Wenjiang, XU Liping, JIANG Jinlei, et al.Research on Control Technology of Telecom Network Fraud Crime[J]. Netinfo Security, 2016, 16(9): 213-217.
|
|
郝文江,徐丽萍,姜劲蕾,等. 电信网络诈骗犯罪治理技术研究[J].信息网络安全,2016,16(9):213-217.
|
[5] |
LIU D Y W, XUE G Z, XIE Y, et al. Chapter 12-Performance of Digital Signature Schemes on Mobile Devices[EB/OL]. , 2017-11-12.
|
[6] |
YUAN Chao, XU Mixue, SI Xueming.Research on a New Signature Scheme on Blockchain[J]. Security and Communication Networks, 2017(2): 1-10.
|
[7] |
YANG Shanjun, JIANG Changjin.A Contract Signing Protocol Based on the Convertible Undeniable Signature[J]. Netinfo Security, 2017, 17(4): 34-39.
|
|
杨善军,姜昌金. 基于可转换的不可抵赖签名的合同签署协议[J]. 信息网络安全,2017,17(4):34-39.
|
[8] |
ANDERSON R.Invited Lecture[C]//ACM. 4th ACM Conference on Computer and Communications Security, April 1-4, 1997, Zurich, Switzerland. New York: ACM, 1997: 1-7.
|
[9] |
BELLARE M, MINER S K.A Forward-secure Digital Signature Scheme[C]//Springer. 19th Annual International Cryptology Conference, August 15-19, 1999, Santa Barbara, CA, USA. Heidelberg: Springer, 1999: 431-448.
|
[10] |
ANDERSON R. Two Remarks on Public Key Cryptology[EB/OL]. , 2017-11-10.
|
[11] |
BURMESTER M, CHRISSIKOPOULOS V, KOTZANIKOLAOU P, et al.Strong Forward Security[C]//ACM. 16th Annual Working Conference on Information Security: Trusted Information: The New Decade Challenge, June 11-13, Beijing, China. New York: ACM, 2001: 109-122.
|
[12] |
GUAN D J, LIN Dairui, WANG C I.A Forward-secure Signature with Backward-secure Detection[C]//IEEE. 2008 International Conference on Information Security and Assurance, April 24-26, 2008, Busan, South Korea. New Jersey: IEEE, 2008: 106-110.
|
[13] |
ZHOU Yousheng, XIN Yang, QING Sihan, et al.Forward-backward Secure Group Signature Scheme[J]. Journal of Beijing University of Technology, 2012, 38(5): 736-739.
|
|
周由胜,辛阳,卿斯汉,等.双向安全的群签名方案[J]. 北京工业大学学报,2012,38(5):736-739.
|
[14] |
ZHANG Xuejun, ZHANG Yue.ID-based Forward Secure Proxy Signature Scheme[J]. Computer Engineering and Applications, 2012, 48(19): 66-68,118.
|
|
张学军,张岳. 基于身份前向安全的代理签名方案[J]. 计算机工程与应用,2012,48(19):66-68,118.
|
[15] |
WEI Jianghong, LIU Wenfen, HU Xuexian.Forward-secure Threshold Attribute-based Signature Scheme[J]. The Computer Journal, 2015, 58(10): 2492-2506.
|
[16] |
SHAMIR A.Identity-based Cryptosystems and Signature Schemes[J]. Workshop on the Theory & Application of Cryptographic Techniques, 1984, 21(2): 47-53.
|
[17] |
JOUX A.A one Round Protocol for Tripartite Diffie-Hellman[C]//Springer. 4th International Symposium on Algorithmic Number Theory, July 2-7, 2000, Leiden, Netherlands. Heidelberg: Springer, 2000: 385-394.
|
[18] |
BONEH D, FRANKLIN M K.Identity-based Encryption from the Weil Pairing[C]//ACM. 21st Annual International Cryptology Conference on Advances in Cryptology, August 19-23, 2001, Santa Barbara, CA, USA. New York: ACM, 2001: 213-229.
|
[19] |
BONEH D, LYNN B, SHACHAM H.Short Signatures from the Weil Pairing[C]//Springer. 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology, December 9-13, 2001, Gold Coast, Australia. Heidelberg: Springer, 2001: 514-532.
|
[20] |
ZHANG Leyou, HU Yupu, WU Qing. New Identity-based Short Signature Without Random Oracles[EB/OL]. , 2017-12-10.
|
[21] |
YANG Lu, YOU Lin, YANG Minghui.An Identity-based Short Signature Broadcast Authentication Protocol in WSNs[J]. Computer Engineering & Science, 2012, 34(2): 25-30.
|
|
杨露,游林,杨明慧. WSN中一种基于身份的短签名广播认证协议[J]. 计算机工程与科学,2012,34(2):25-30.
|
[22] |
ASAAR M R, SALMASIZADEH M, SUSILO W. A Short Identity-based Proxy Ring Signature Scheme from RSA[EB/OL]. , 2017-12-10.
|
[23] |
KARATI A, BISWAS G P.Efficient and Provably Secure Random Oracle-free Adaptive Identity-based Encryption with Short-signature Scheme[J]. Security and Communication Networks, 2016, 9(17): 4060-4074.
|
[24] |
MESHRAM C Y, POWAR P L, OBAIDAT M S. An UF-IBSS-CMA Protected Online/Offline Identity-based Short Signature Technique using PDL[EB/OL]. , 2017-12-10.
|
[25] |
LI Xiao, HE Mingxing.A Forward Security Digital Signature Scheme Based on RSA[J]. Computer Engineering and Applications, 2006, 42(16): 124-126.
|
|
李虓,何明星. 基于RSA的前向安全的数字签名[J]. 计算机工程与应用,2006,42(16):124-126.
|
[26] |
MISTSUNARI S, SAKAI R, KASAHARA M.A New Traitor Tracing[J]. IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences, 2002, 85(2): 481-484.
|
[27] |
CHA J C, CHEON J H.An Identity-based Signature from Gap Diffie-Hellman Groups[C]//Springer. 6th International Workshop on Theory and Practice in Public Key Cryptography: Public Key Cryptography, January 6-8, 2003, Miami, FL, USA. Heidelberg: Springer, 2003: 18-30.
|
[28] |
HESS F.Efficient Based Signature Schemes Based on Pairings[C]//Springer. 9th Annual International Workshop on Selected Areas in Cryptography, August 15-16, 2002, Newfoundland, Canada. Heidelberg: Springer, 2002: 310-324.
|
[29] |
BARRETO P S L M, LIBERT B, MCCULLAGH N, et al. Efficient and Provably-Secure Identity-based Signatures and Sign-cryption from Bilinear Maps[EB/OL]. , 2017-12-10.
|