[1] |
中兴通讯学院.对话多媒体通信[M]. 北京: 人民邮电出版社, 2010.
|
|
ZTE UNIVERSITY.. Talk to multimedia communication[M]. Beijing: Posts and Telecom PressPress, 2010.
|
[2] |
RIVEST R L , SHAMIR A , ADLEMAN L A . Method for obtaining digital signatures and public-key cryptosystems[J]. Communications of the ACM, 1978,21(2): 120-126.
|
[3] |
GOLDWASSER S , MICALI S , RIVEST R L . A digital signature scheme secure against adaptive chosen-message attacks[J]. Siam Journal of Computing, 1988,17(2): 281-308.
|
[4] |
ELGAMAL T , . A public key cryptosystem and a signature scheme based on discrete logarithms[C]// Workshop on the Theory and Application of Cryptographic Techniques (Eurocrypt 1984). 1984: 10-18.
|
[5] |
ELGAMAL T . A public key cryptosystem and a signature scheme based on discrete logarithms[J]. IEEE Trans inf theory, 1984,31(4): 469-472.
|
[6] |
STANDARDS N I O . Digital signature standard (DSS)[J].,2000,25. Federal Information Processing Standards Publication 186-2, 2000,25.
|
[7] |
BELLARE M , ROGAWAY P . The exact security of digital signatures-how to sign with RSA and rabin[C]// International Conference on Theory and Application of Cryptographic Techniques. 1996: 399-416.
|
[8] |
SCHNORR C P . Efficient signature generation by smart cards[J]. Journal of Cryptology, 1991,4(3): 161-174.
|
[9] |
STEINFELD R , BULL L , ZHENG Y . Content extraction signatures[C]// The International Conference on Information Security and Cryptology ( ICISC 2001). 2001: 285-304.
|
[10] |
BULL L , SQUIRE D M G , ZHENG Y . A hierarchical extraction policy for content extraction signatures[J]. International Journal on Digital Libraries, 2004,4(3): 208-222.
|
[11] |
蓝才会, 王彩芬 . 基于身份的可截取签名方案[J]. 计算机应用, 2007,27(10): 2456-2458.
|
|
LAN C H , WANG C F . ID-based content extraction signature[J]. Journal of Computer Applications, 2007
|
[12] |
曹素珍, 王彩芬 . 基于离散对数问题的可截取签名方案[J]. 计算机工程, 2013,39(4): 132-136.
|
|
CAO S Z , WANG C F . Content extraction signature scheme based on DLP[J]. Computer Engineering, 2013,39(4): 132-136.
|
[13] |
李旭, 杜小妮, 王彩芬 ,等. 基于RSA的可截取签名改进方案[J]. 计算机工程与应用, 2014,50(24): 96-99.
|
|
XU L I , XIAONI D U , WANG C ,et al. Improved scheme of content extraction signatures based on RSA[J]. Computer Engineering& Applications, 2014
|
[14] |
WANG C , LI Y , HUANG S Y ,et al. A new forward secure content extraction signature scheme[C]// International Conference on Fuzzy Systems and Knowledge Discovery. 2016: 1698-1702.
|
[15] |
王彩芬, 徐婷, 张玉磊 ,等. 基于可截取签名和属性加密的云存储访问控制方案[J]. 计算机工程与科学, 2015,37(2): 238-244.
|
|
WANG C F , TING X U , ZHANG Y L ,et al. An access control scheme in cloud storage based on content extraction signature and attribute encryption[J]. Computer Engineering & Science, 2015
|
[16] |
王敏, 马金花, 刘江华 ,等. 两类可截取签名方案的改进[J]. 网络与信息安全学报, 2017,3(4): 69-77.
|
|
WANG M , MA J H , LIU J H ,et al. The two improvements of the content extraction signature[J]. Chinese Journal of Network and Information Security, 2017,3(4): 69-77.
|
[17] |
FIAT A . Batch RSA[J]. Journal of Cryptology, 1997,10(2): 75-88.
|
[18] |
PAVLOVSKI C J , BOYD C . Efficient batch signature generation using tree structures[C]// International Workshop on Cryptographic Techniques and E-Commerce (CrypTEC 1999). 1999: 70-77.
|
[19] |
CATALANO D , FIORE D . Vector commitments and their applications[M]// Public-Key Cryptography–PKC 2013. Springer Berlin Heidelberg, 2013: 55-72.
|
[20] |
WATERS B . Efficient identity-based encryption without random oracles[J]. Eurocrypt, 2005,2004(2004): 114-127.
|
[21] |
KATZ J . Digital signatures[M]. Springer US, 2010: 127-128.
|