[1] |
SHAMIR A , . Identity-based cryptosystems and signature schemes[C]// CRYPTO 1984,LNCS 0196. Springer Berlin Heidelberg, 1984: 47-53.
|
[2] |
BONEH D , FRANKLIN M . Identity-based encryption from the Weil pairing[C]// CRYPTO 2001,LNCS 2139. Springer Berlin Heidelberg, 2001: 213-229.
|
[3] |
KAR J . Provably secure on-line/off-line identity-based signature scheme for wireless sensor network[J]. IJ Network Security, 2014,16(1): 29-39.
|
[4] |
TIAN M , HUANG L . Efficient identity-based signature from lattices[M]. ICT Systems Security and Privacy Protection,Springer Berlin Heidelberg, 2014: 321-329.
|
[5] |
TSENG Y M , TSAI T T , HUANG S S . Leakage-free ID-based signature[J]. The Computer Journal, 2015,58(4): 750-757.
|
[6] |
ATTRAPADUNG N , EMURA K , HANAOKA G ,et al. A revocable group signature scheme from identity-based revocation techniques:achieving constant-size revocation list[C]// Applied Cryptography and Network Security. 2014: 419-437.
|
[7] |
HAO S G , LI Z , GHULAM M . A union authentication protocol of cross-domain based on bilinear pairing[J]. Journal of Software, 2013,8(5): 1094-1100.
|
[8] |
ZHANG J , SUN Z . An ID-based server-aided verification short signature scheme avoid key escrow[J]. Journal of Information Science and Engineering, 2013,29(3): 459-473.
|
[9] |
CANETTI R , GOLDREICH O , HALEVI S . The random oracle methodology,revisited[J]. Journal of the ACM, 2004,51(4): 557-594.
|
[10] |
PATERSON K G , SCHULDT J C N . Efficient identity-based signatures secure in the standard model[C]// ACISP,LNCS 4058. Springer Berlin Heidelberg, 2006: 207-222.
|
[11] |
WU Q , ZHANG L Y . New strongly unforgeable identity-based signature scheme in the standard model[J]. Journal of Beijing University of Posts and Telecommunications, 2011,34(3): 71-74.
|
[12] |
TSAI T T , TSENG Y M , HUANG S S . Efficient strongly unforgeable ID-based signature without random oracles[J]. Informatica, 2014,25(3): 505-521.
|
[13] |
HUNG Y H , TSAI T T , TSENG Y M ,et al. Strongly secure revocable ID-based signature without random oracles[J]. Information Technology and Control, 2014,43(3): 264-276.
|
[14] |
KWON S . An identity-based strongly unforgeable signature without random oracles from bilinear pairings[J]. Information Sciences, 2014,276(1): 1-9.
|
[15] |
WU W , MU Y , SUSILO W ,et al. Provably secure server-aided verification signatures[J]. Computers &Mathematics with Applications, 2011,61(7): 1705-1723.
|
[16] |
WANG Z , WANG L , YANG Y ,et al. 's server-aided verification signature schemes[J]. IJ Network Security, 2010,10(2): 158-160.
|
[17] |
WU H , XU C X , DENG J ,et al. On the security of server-aided verification signature schemes[J]. Journal of Computational Information System, 2013,9(4): 1449-1454.
|