[1] |
SHAMIR A. Identity-Based Cryptosystems and Signature Schemes[C]// Springer. Workshop on the Theory and Application of Cryptographic Techniques. Berlin:Springer, 1984: 47-53.
|
[2] |
GENTRY C. Certificate-Based Encryption and the Certificate Revocation Problem[C]// Springer. International Conference on the Theory and Applications of Cryptographic Techniques. Berlin:Springer, 2003: 272-293.
|
[3] |
KANG B G, PARK J H, HAHN S G. A Certificate-Based Signature Scheme[C]// Springer. Cryptographers’ Track at the RSA Conference. Berlin:Springer, 2004: 99-111.
|
[4] |
LI Jiguo, HUANG Xinyi, MU Yi, et al. Certificate-Based Signature: Security Model and Efficient Construction[C]// Springer. European Public Key Infrastructure Workshop. Berlin:Springer, 2007: 110-125.
|
[5] |
WU Wei, MU Yi, SUSILO W, et al. Certificate-Based Signatures: New Definitions and a Generic Construction from Certificateless Signatures[C]// Springer. International Workshop on Information Security Applications(WISA) 2008. Berlin:Springer, 2008: 99-114.
|
[6] |
HUANG Rufen, HUANG Zhenjie, CHEN Qunshan. A Generic Conversion from Proxy Signatures to Certificate-Based Signatures[J]. Journal of Internet Technology, 2021, 22(1): 209-217.
|
[7] |
WU Libing, ZHANG Yubo, REN Yongjun, et al. Efficient Certificate-Based Signature Scheme for Electronic Commerce Security Using Bilinear Pairing[J]. Journal of Internet Technology, 2017, 18(5): 1159-1166.
|
[8] |
MA Xinxin, SHAO Jun, ZUO Cong, et al. Efficient Certificate-Based Signature and Its Aggregation[C]// Springer. Information Security Practice and Experience(ISPEC) 2017. Berlin:Springer, 2017: 391-408.
|
[9] |
LIU J K, BAEK J, SUSILO W, et al. Certificate-Based Signature Schemes Without Pairings or Random Oracles[C]// Springer. International Conference on Information Security. Berlin:Springer, 2008: 285-297.
|
[10] |
ZHANG Jianhong. On the Security of a Certificate-Based Signature Scheme and Its Improvement with Pairings[C]// Springer. Information Security Practice and Experience(ISPEC). Berlin:Springer, 2008: 285-297.
|
[11] |
LU Yang, LI Jiguo. Improved Certificate‐Based Signature Scheme Without Random Oracles[J]. IET Information Security, 2016, 10(2): 80-86.
doi: 10.1049/ise2.v10.2
URL
|
[12] |
ZHOU Caixue, CUI Zongmin. Certificate‐Based Signature Scheme in the Standard Model[J]. IET Information Security, 2017, 11(5): 256-260.
doi: 10.1049/ise2.v11.5
URL
|
[13] |
WANG Guoqiang, CAO Yanmei. An Efficient Certificate-Based Signature Scheme in the Standard Model[C]// Springer. International Conference on Applied Cryptography and Network Security. Berlin:Springer, 2021: 313-329.
|
[14] |
AU M H, LIU J K, SUSILO W, et al. Certificate Based (Linkable) Ring Signature[C]// Springer. International Conference on Information Security Practice and Experience. Berlin:Springer, 2007: 79-92.
|
[15] |
YUAN Feng, CHENG Zhaohui. Overview on SM9 Identity-Based Cryptographic Algorithm[J]. Journal of Information Security Research, 2016, 2(11): 1008-1027.
|
[16] |
ZHANG Chao, PENG Changgen, DING Hongfa, et al. SM9-Based Searchable Encryption Scheme[J]. Computer Engineering, 2022(7): 159-167.
|
|
张超, 彭长根, 丁红发, 等. 基于国密SM9的可搜索加密方案[J]. 计算机工程, 2022(7): 159-167.
|
[17] |
PENG Cong, HE Debiao, LUO Min, et al. An Identity-Based Ring Signature Scheme for SM9 Algorithm[J]. Journal of Cryptologic Research, 2021, 8(4): 724-734.
doi: 10.13868/j.cnki.jcr.000473
|
|
彭聪, 何德彪, 罗敏, 等. 基于SM9标识密码算法的环签名方案[J]. 密码学报, 2021, 8(4):724-734.
|
[18] |
ZHANG Xuefeng, PENG Hua. Blind Signature Scheme Based on SM9 Algorithm[J]. Netinfo Security, 2019, 19(8): 61-67.
|
[19] |
ZHANG Yu, SUN Guangmin, LI Yu. Research on Mobile Internet Authentication Scheme Based on SM9 Algorithm[J]. Netinfo Security, 2021, 21(4): 1-9.
|
[20] |
LIU J K, BAO Feng, ZHOU Jianying. Short and Efficient Certificate-Based Signature[C]// Springer. International Conference on Research in Networking. Berlin: Springer, 2011: 167-178.
|
[21] |
PEREIRA G C C F, SIMPLICIO J M A, NAEHRIG M, et al. A Family of Implementation-Friendly BN Elliptic Curves[J]. Journal of Systems and Software, 2011, 84(8): 1319-1326.
doi: 10.1016/j.jss.2011.03.083
URL
|