[1] |
GB/T 32918.1-2016 Information Security Technology-Public Key Cryptographic Algorithm SM2 Based on Elliptic Curves-Part 1: General[S]. Beijing: Standards Press of China, 2016.
|
|
GB/T 32918.1-2016 信息安全技术 SM2椭圆曲线公钥密码算法第1部分:总则[S]. 北京: 中国标准出版社, 2016.
|
[2] |
GB/T 35276-2017 Information Security Technology-SM2 Cryptographic Algorithm Usage Specification[S]. Beijing: Standards Press of China, 2017.
|
|
GB/T 35276-2017 信息安全技术 SM2密码算法使用规范[S]. 北京: 中国标准出版社, 2017.
|
[3] |
GB/T 32918.2-2016 Information Security Technology-Public Key Cryptographic Algorithm SM2 Based on Elliptic Curves-Part 2: Digital Signature Algorithm[S]. Beijing: Standards Press of China, 2016.
|
|
GB/T 32918.2-2016 信息安全技术 SM2椭圆曲线公钥密码算法第2部分:数字签名算法[S]. 北京: 中国标准出版社, 2016.
|
[4] |
LIU Zhenya, LIN Jingqiang. Framework of Two-Party Threshold Computation Scheme for SM2 Digital Signature Algorithm[EB/OL]. (2023-10-16)[2024-01-16]. https://kns.cnki.net/kcms2/article/abstract?v=fsvnL9wA1q1ZsXDk2lRFGHptzA7hvLFqjtRGwI-08R6wfBiPrs89JBi1tfQzgBuLn5KdbYHihbhak3z4p8cyCl0ArAl2p7It0oB4O3V55ple8Rhsp4DcQeIcEUiduje9SwtgIL3mPP4=&uniplatform=NZKPT&language=CHS.
|
|
刘振亚, 林璟锵. SM2数字签名算法的两方门限计算方案框架[EB/OL]. (2023-10-16)[2024-01-16]. https://kns.cnki.net/kcms2/article/abstract?v=fsvnL9wA1q1ZsXDk2lRFGHptzA7hvLFqjtRGwI-08R6wfBiPrs89JBi1tfQzgBuLn5KdbYHihbhak3z4p8cyCl0ArAl2p7It0oB4O3V55ple8Rhsp4DcQeIcEUiduje9SwtgIL3mPP4=&uniplatform=NZKPT&language=CHS.
|
[5] |
TANG Jinquan, LIANG Hao. A TLCP Secure Communication Scheme Based on SM2 Homomorphic Signature[J]. Netinfo Security, 2023(S1): 32-35.
|
|
唐金泉, 梁皓. 一种基于SM2同态签名的TLCP安全通信方案[J]. 信息网络安全, 2023(S1):32-35.
|
[6] |
ZHAO Yanqi, YANG Xiaoyi, FENG Qi, et al. Anonymous Credential Protocol Based on SM2 Digital Signature[EB/OL]. (2023-08-28)[2024-01-28]. https://kns.cnki.net/kcms2/article/abstract?v=fsvnL9wA1q2kyhPUcSttc1A9uC-EmBXut661lrrLpHM4QVwPX9pQdFQQl40tCqN9sPZwQH-f9woqW3_E2s8H_-jf64Hcw4SHgYNShdbBRMJKgZ9Su9CLhQ7cIZeX8rPUOITM_ssrdZ0=&uniplatform=NZKPT&language=CHS.
|
|
赵艳琦, 杨晓艺, 冯琦, 等. 基于SM2数字签名的匿名凭证协议[EB/OL]. (2023-08-28)[2024-01-28]. https://kns.cnki.net/kcms2/article/abstract?v=fsvnL9wA1q2kyhPUcSttc1A9uC-EmBXut661lrrLpHM4QVwPX9pQdFQQl40tCqN9sPZwQH-f9woqW3_E2s8H_-jf64Hcw4SHgYNShdbBRMJKgZ9Su9CLhQ7cIZeX8rPUOITM_ssrdZ0=&uniplatform=NZKPT&language=CHS.
|
[7] |
TU Binbin, CHEN Yu. Batch-Proof Supported SM2 Adaptor Signature and Its Distributed Extension[EB/OL]. (2023-08-10)[2024-01-28]. https://kns.cnki.net/kcms2/article/abstract?v=fsvnL9wA1q0WDT5VDmPzOYroZ1ynVQuzAi3wVmd5mw-hx0ZhmRZ9SBL6CZQfAXnT0T4nbLt-UycSOxgaaDckyZ9cLbhI6qO60AmG5uUDBPNfrnPeNEktkSqr4zH2yewElJm7IrTp1Xk=&uniplatform=NZKPT&language=CHS.
|
|
涂彬彬, 陈宇. 支持批量证明的SM2适配器签名及其分布式扩展[EB/OL]. (2023-08-10)[2024-01-28]. https://kns.cnki.net/kcms2/article/abstract?v=fsvnL9wA1q0WDT5VDmPzOYroZ1ynVQuzAi3wVmd5mw-hx0ZhmRZ9SBL6CZQfAXnT0T4nbLt-UycSOxgaaDckyZ9cLbhI6qO60AmG5uUDBPNfrnPeNEktkSqr4zH2yewElJm7IrTp1Xk=&uniplatform=NZKPT&language=CHS.
|
[8] |
RIVEST R L, SHAMIR A, TAUMAN Y. How to Leak a Secret[C]// Springer. The 7th International Conference on the Theory and Application of Cryptology and Information Security. Heidelberg: Springer, 2001: 552-565.
|
[9] |
BRESSON E, STERN J, SZYDLO M. Threshold Ring Signatures and Applications to Ad-Hoc Groups[C]// Springer. The 22nd Annual International Cryptology Conference. Heidelberg: Springer, 2002: 465-480.
|
[10] |
TSANG P P, WEI V K, CHAN T K, et al. Separable Linkable Threshold Ring Signatures[C]// Springer. The 5th International Conference on Cryptology. Heidelberg: Springer, 2004: 384-398.
|
[11] |
AWASTHI A K, LAI S. ID-Based Ring Signature and Proxy Ring Signature Schemes from Bilinear Pairings[J]. International Journal of Network Security, 2007, 4(2): 187-192.
|
[12] |
KOMANO Y, OHTA K, SHIMBO A, et al. Toward the Fair Anonymous Signatures: Periodically Deniable Ring Signatures[J]. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2007(1): 54-64.
|
[13] |
WU Qianhong, SUSILO W, YI Mu, et al. Ad Hoc Group Signatures[C]// Springer. Advances in Information and Computer Security. Heidelberg: Springer, 2006: 120-135.
|
[14] |
ZENG Shengke, JIANG Shaoquan, QIN Zhiguang. An Efficient Conditionally Anonymous Ring Signature in the Random Oracle Model[J]. Theoretical Computer Science, 2012, 461: 106-114.
|
[15] |
ZENG Shengkai, LI Qinyi, QIN Zhiguang, et al. Non-Interactive Periodically Deniable Ring Signature without Random Oracles[J]. Security and Communication Networks, 2016, 9(12): 1810-1819.
|
[16] |
BAO Zijian, HE Debiao, PENG Cong, et al. Deniable Ring Signature Based on SM2 Digital Signature Algorithm[J]. Journal of Cryptography, 2023, 10(2): 264-275.
|
|
包子健, 何德彪, 彭聪, 等. 基于SM2数字签名算法的可否认环签名[J]. 密码学报, 2023, 10(2):264-275.
|
[17] |
HAN Baojie, LI Zichen. Research and Design of Ring Signature Scheme Based on SM2 Cryptographic Algorithm[J]. Communication Technology, 2021, 54(7): 1721-1725.
|
|
韩宝杰, 李子臣. 基于SM2密码算法的环签名方案的研究与设计[J]. 通信技术, 2021, 54(7):1721-1725.
|
[18] |
FAN Qing, HE Debiao, LUO Min, et al. A Ring Signature Scheme Based on SM2 Digital Signature Algorithm[J]. Journal of Cryptography, 2021, 8(4): 710-723.
|
|
范青, 何德彪, 罗敏, 等. 基于SM2数字签名算法的环签名方案[J]. 密码学报, 2021, 8(4):710-723.
|
[19] |
GAO Wen, CHEN Liqun, HU Yupu, et al. Lattice-Based Periodically Deniable Ring Signatures[J]. International Journal of Information Security, 2019, 18: 355-370.
|
[20] |
JIANG Yuzhang, HE Mingxing, ZHANG Xinhai, et al. Blockchain-Based Anonymous Authentication Mechanism with Semi-TTP for Vanets[C]// IEEE. IEEE 6th International Conference on Cloud Computing and Big Data Analytics(ICCCBDA). New York: IEEE, 2021: 657-666.
|