[1] |
HUANG Xinyi, MU Yi, SUSILO W, et al. Preserving Transparency and Accountability in Optimistic Fair Exchange of Digital Signatures[J]. IEEE Transactions on Information Forensics and Security, 2011, 6(2): 498-512.
doi: 10.1109/TIFS.2011.2109952
URL
|
[2] |
CHEN Liqun, LI Jiangtao. Flexible and Scalable Digital Signatures in TPM 2.0[C]//ACM. 2013 ACM SIGSAC Conference on Computer & Communications Security. New York: ACM, 2013: 37-48.
|
[3] |
CHEN Yameng, CHENG Xiangguo, WANG Shuo, et al. Research on Certificateless Group Signature Scheme Based on Bilinear Pairings[J]. Netinfo Security, 2017, 17(3): 53-58.
|
|
陈亚萌, 程相国, 王硕, 等. 基于双线性对的无证书群签名方案研究[J]. 信息网络安全, 2017, 17(3): 53-58.
|
[4] |
SHAMIR A. Identity-Based Cryptosystems and Signature Schemes[C]//Springer. Workshop on the Theory and Application of Cryptographic Techniques. Heidelberg: Springer, 1984: 47-53.
|
[5] |
AL-RIYAMI S S, PATERSON K G. Certificateless Public Key Cryptography[C]//Springer. International Conference on the Theory and Application of Cryptology and Information Security. Heidelberg: Springer, 2003: 452-473.
|
[6] |
CHAUM D. Blind Signatures for Untraceable Payments[C]//Springer. Advances in Cryptology. Heidelberg: Springer, 1983: 199-203.
|
[7] |
ZHANG Fangguo, KIM K. Efficient ID-Based Blind Signature and Proxy Signature from Bilinear Pairings[C]//Springer. Australasian Conference on Information Security and Privacy. Heidelberg: Springer, 2003: 312-323.
|
[8] |
LI Rupeng, YU Jia, LI Guowen, et al. A New Identity-Based Blind Signature Scheme with Batch Verifications[C]//IEEE. 2007 International Conference on Multimedia and Ubiquitous Engineering ( MUE’07). New York: IEEE, 2007: 1051-1056.
|
[9] |
ZHANG Xuefeng, PENG Hua. Blind Signature Scheme Based on SM9 Algorithm[J]. Netinfo Security, 2019, 19(8): 61-67.
|
|
张雪锋, 彭华. 一种基于SM9算法的盲签名方案研究[J]. 信息网络安全, 2019, 19(8): 61-67.
|
[10] |
ZHANG Lei, ZHANG Futai. Certificateless Signature and Blind Signature[J]. Journal of Electronics (China), 2008, 25(5): 629-635.
doi: 10.1007/s11767-007-0070-8
URL
|
[11] |
SUN Shifeng, WEN Qiaoyan. Novel Efficient Certificateless Blind Signature Schemes[C]//IEEE. 2009 International Symposium on Computer Network and Multimedia Technology. New York: IEEE, 2009: 1-5.
|
[12] |
JOSE S, GAUTAM A, RANGAN C P. A New Certificateless Blind Signature Scheme[J]. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 2014, 5(1): 122-141.
|
[13] |
TANG Weizhong, ZHANG Dawei, TONG Hui. Certificateless Blind Signature Scheme Based on SM2[J]. Application Research of Computers, 2022, 39(2): 552-556.
|
|
唐卫中, 张大伟, 佟晖. 基于SM2的无证书盲签名方案[J]. 计算机应用研究, 2022, 39(2): 552-556.
|
[14] |
BERNSTEIN D J, DUIF N, LANGE T, et al. High-Speed High-Security Signatures[J]. Journal of Cryptographic Engineering, 2012, 2(2): 77-89.
doi: 10.1007/s13389-012-0027-1
URL
|
[15] |
BERNSTEIN D J, BIRKNER P, JOYE M, et al. Twisted Edwards Curves[C]//Springer. International Conference on Cryptology in Africa. Heidelberg: Springer, 2008: 389-405.
|
[16] |
JUELS A, LUBY M, OSTROVSKY R. Security of Blind Digital Signatures[C]//Springer. Annual International Cryptology Conference. Heidelberg: Springer, 1997: 150-164.
|