[1] |
CHAUM D. Blind Signatures for Untraceable Payments[EB/OL]., 2017-10-11.
|
[2] |
ABE M, FUJISAKI E.How to date blind signatures[C]//Springer. 1996 International Conference on the Theory and Application of Cryptology and Information Security, November 3-7, 1996, Kyongju, Korea. Heidelberg: Springer,1996: 244-251.
|
[3] |
CHOW S, HUI L, YIU S, et al.Two Improved Partially Blind Signature Schemes from Bilinear Pairings[C]//Springer. 2005 Australasian Conference on Information Security and Privacy, July 4-6, 2005, Brisbane, Australia. Heidelberg: Springer, 2005:316-328.
|
[4] |
陈莉,顾纯祥,尚明君. 抗量子攻击的高效盲签名方案[J]. 信息网络安全,2017(10):36-41.
|
[5] |
左黎明,张婷婷,郭红丽,等. 对一个基于身份的部分盲签名方案的攻击与改进[J]. 计算机工程与科学,2017,39(10):1832-1836.
|
[6] |
TANG Yongli, ZHOU Jin, LIU Kun, et al.Lattice-based Identity-based Blind Signature Scheme in Standard Model[J]. Journal of Frontiers of Computer Science and Technology, 2017, 11(12): 1965-1971.
|
[7] |
王辉,石润华,仲红,等. 一种基于量子超密编码的代理盲签名方案的研究[J]. 信息网络安全,2016(11):28-32.
|
[8] |
SHOR P.Polynomial-time Algorithm for Prime Factorization and Discrete Logarithms on a Quantum Computer[J]. SIAM Journal on Computing, 1997, 26(5): 1484-1509.
|
[9] |
AJTAI M.Generating Hard Instances of Lattice Problems[C]//ACM. 28th Annual ACM Symposium on the Theory of Computing, May 22-24, 1996, Philadelphia, Pennsylvania, USA. New York: ACM, 1996: 99-108.
|
[10] |
闫玺玺,刘媛,胡明星,等. 云环境下基于LWE的多机构属性基加密方案[J]. 信息网络安全,2017(9):128-133.
|
[11] |
GENTRY C, PEIKERT C, VAIKUNTANATHAN V.Trapdoors for Hard Lattices and New Cryptographic Constructions[C]//ACM. 40th Annual ACM Symposium on Theory of Computing, May 17-20, 2008, Victoria, British Columbia, Canada. New York: ACM, 2008: 197-206.
|
[12] |
闫玺玺,刘媛,李子臣,等. 云环境下理想格上的多机构属性基加密隐私保护方案[J]. 信息网络安全,2017(8):19-25.
|
[13] |
TIAN Miao, HUANG Liusheng.Identity-based Signatures from Lattices: Simpler, Faster, Shorter[J]. Fundamenta Infomaticae, 2014, 145(2): 171-187.
|
[14] |
LYUBASHEVSKY V.Lattice Signatures without Trapdoors[C]//Springer. 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, April 15-19, 2012, Cambridge, UK. Heidelberg: Springer, 2012: 738-755.
|
[15] |
TIAN Haibo, ZHANG Fangguo, WEI Baodian.A Lattice-based Partially Blind Signature[J]. Security and Communication Networks, 2016, 9(12): 1820-1828.
|
[16] |
ABE M, OKAMOTO T.Provably Secure Partially Blind Signatures[C]//Springer. 20th Annual International Cryptology Conference, August 20-24, 2000, Santa Barbara, California, USA. Heidelberg: Springer, 2000: 271-286.
|
[17] |
王小云,刘明洁. 格密码学研究[J]. 密码学报,2014,1(1):13-27.
|
[18] |
MICCIANCIO D, REGEV O.Worst-case to Average-case Reductions Based on Gaussian Measures[J].SIAM Journal on Computing, 2007, 37(1): 267-302.
|
[19] |
POINTCHEVAL D, STERN J.Security Arguments for Digital Signatures and Blind Signatures[J].Journal of Cryptology, 2000, 13(3): 361-396.
|
[20] |
GU Chunxiang, CHEN Li, ZHENG Yonghui.ID-based Signatures from Lattices in the Random Oracle Model[C]//Springer. 2012 Web Information Systems and Mining, October 26-28, 2012, Chengdu, China. Heidelberg: Springer, 2012: 222-230.
|
[21] |
TIAN Miaomiao, HUANG Liusheng, YANG Wei.Efficient Hierarchical Identity-based Signatures from Lattices[J]. International Journal of Electronic Security and Digital Forensics, 2013, 5(1): 1-10.
|