[1] |
RIVEST R L , SHAMIR A , ADLEMAN L . A method for obtaining digital signatures and public-key cryptosystems[J]. Communications of the ACM, 1978,21(2): 120-126.
|
[2] |
STEINFELD R , BULL L , ZHENG Y . Content extraction signatures[C]// The International Conference on Information Security and Cryptology ( ICISC 2001). 2001: 285-304.
|
[3] |
ELGAMAL T , . A public key cryptosystem and a signature scheme based on discrete logarithms[C]// Workshop on the Theory and Application of Cryptographic Techniques (Eurocrypt 1984). 1984: 10-18.
|
[4] |
SCHNORR C P , . Efficient identification and signatures for smart cards[C]// Workshop on the Theory and Application of Cryptographic Techniques ( Eurocrypt 1989). 1989: 239-252.
|
[5] |
BONEH D , . Digital signature standard[M]// Encyclopedia of Cryptography and Security.Berlin:Springer. 2011: 347-347.
|
[6] |
LI J , ZHANG F , CHEN X ,et al. Generic security-amplifying methods of ordinary digital signatures[J]. Information Sciences, 2012,2011(9): 128-139.
|
[7] |
BULL L , STANSKI P , SQUIRE D M G . Content extraction signatures using XML digital signatures and custom transforms on-demand[C]// The 12th International Conference on World Wide Web ( WWW 2003). 2003: 170-177.
|
[8] |
BARTEL M , BOYER J , FOX B ,et al. XML-signature syntax and processing[J]. W3C Recommendation, 2002,(12).
|
[9] |
BULL L , SQUIRE D M G , ZHENG Y . A hierarchical extraction policy for content extraction signatures[J]. International Journal on Digital Libraries, 2004,4(3): 208-222.
|
[10] |
刘军龙, 王彩芬 . 基于身份的可截取门限签名方案[J]. 计算机应用, 2006,26(8): 1817-1820.
|
|
LIU J , WANG C F . ID-based CES threshold signature[J]. Computer Engineering and Applications, 2006,26(8): 1817-1820.
|
[11] |
SHAMIR A , . Identity-based cryptosystems and signature schemes[C]// Workshop on the Theory and Application of Cryptographic Techniques ( Eurocrypt 1984). 1984: 47-53.
|
[12] |
FIAT A . Batch rsa[J]. Journal of Cryptology, 1997,10(2): 75-88.
|
[13] |
PAVLOVSKI C , BOYD C . Efficient batch signature generation using tree structures[C]// The International Workshop on Cryptographic Techniques and E-Commerce (CrypTEC 1999). 1999: 70-77.
|
[14] |
王彩芬, 徐婷, 张玉磊 ,等. 基于可截取签名和属性加密的云存储访问控制方案[J]. 计算机工程与科学, 2015,37(2): 238-244.
|
|
WANG C F , XU T , ZHANG Y L ,et al. An access control scheme in cloud storage based on content extraction signature and attribute encryption[J]. Computer Engineering and Science, 2015,37(2): 238-244.
|
[15] |
李旭, 杜小妮, 王彩芬 ,等. 基于 RSA 的可截取签名改进方案[J]. 计算机工程与应用, 2014,50(24): 96-99.
|
|
LI X , DU X N , WANG C F ,et al. Improved scheme of content extraction signatures based on RSA[J]. Computer Engineering and Applications, 2014,50(24): 96-99.
|
[16] |
WANG C , LI Y , HUANG S Y ,et al. A new forward secure content extraction signature scheme[C]// The International Conference on Fuzzy Systems and Knowledge Discovery ( FSKD 2015). 2015: 1698-1702.
|