[1] |
XIONG H , WU Q , CHEN Z . An efficient provably secure certificateless aggregate signature applicable to mobile computation[J]. Control and Cybernetics, 2012,41(2): 373-391.
|
[2] |
刘丹, 石润华, 张顺 ,等. 无线网络中基于无证书聚合签名的高效匿名漫游认证方案[J]. 通信学报, 2016,37(7): 182-192.
|
|
LU D , SHI R H , ZHANG S ,et al. Efficient anongmons roaming autbenticotion scheme using certificateless aggregate signature in wireless network[J]. Journal on Communications, 2016,37(7): 182-192.
|
[3] |
JIANG Y , LIN C , SHEN X ,et al. Mutual authentication and key exchange protocols for roaming services in wireless mobile networks[J]. IEEE Transactions on Wireless Communications, 2006,5(9): 2569-2577.
|
[4] |
ZHOU T , XU J . Provable secure authentication protocol with anonymity for roaming service in global mobility networks[J]. Computer Networks, 2011,55(1): 205-213.
|
[5] |
REN K , LOU W , KIM K ,et al. A novel privacy preserving authentication and access control scheme for pervasive computing environments[J]. IEEE Transactions on Vehicular Technology, 2006,55(4): 1373-1384.
|
[6] |
KIM J , CHOI S , KIM K ,et al. Anonymous authentication protocol for dynamic groups with power-limited devices[C]// Symposium on Cryptography and Information Security (SCIS’03). 2013: 405-410.
|
[7] |
WAN Z , REN K , PRENEEL B . A secure privacy-preserving roaming protocol based on hierarchical identity-based encryption for mobile networks[C]// The lst ACM Conference on Wireless Network Security. ACM, 2008: 62-67.
|
[8] |
YANG G , HUANG Q , WONG D S ,et al. Universal authentication protocols for anonymous wireless communications[J]. IEEE Transactions on Wireless Communications, 2010,9(1): 168-174.
|
[9] |
Al-RIYAMI S S , PATERSON K G . Certificateless public key cryptography[C]// International Conference on the Theory and Application of Cryptology and Information Security. Springer Berlin Heidelberg, 2003: 452-473.
|
[10] |
YAP W S , HENG S H , GOI B M . An efficient certificateless signature scheme[C]// International Conference on Embedded and Ubiquitous Computing. Springer Berlin Heidelberg, 2006: 322-331.
|
[11] |
LI J , HUANG X , MU Y ,et al. Cryptanalysis and improvement of an efficient certificateless signature scheme[J]. Journal of Communications and Networks, 2008,10(1): 10-17.
|
[12] |
AU M H , MU Y , ChEN J ,et al. Malicious KGC attacks in certificateless cryptography[C]// The 2nd ACM Symposium on Information,Computer and Communications Security. ACM, 2007: 302-311.
|
[13] |
GONG Z , LONG Y , HONG X ,et al. Two certificateless aggregate signatures from bilinear maps[C]// Software Engineering,Artificial Intelligence,Networking,and Parallel/Distributed Computing,2007.SNPD 2007. Eighth ACIS International Conference on IEEE, 2007,3: 188-193.
|
[14] |
ZHANG L , ZHANG F . A new certificateless aggregate signature scheme[J]. Computer Communications, 2009,32(6): 1079-1085.
|
[15] |
HORNG S J , TZENG S F , HUANG P H ,et al. An efficient certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks[J]. Information Sciences, 2015,317: 48-66.
|
[16] |
LI J , YUAN H , ZHANG Y . Cryptanalysis and improvement of certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks[J]. Networks, 2015,317: 48-66.
|
[17] |
POINTCHEVAL D , STERN J . Security arguments for digital signatures and blind signatures[J]. Journal of Cryptology, 2000,13(3): 361-396.
|