[1] |
DESMEDT Y , . Threshold cryptosystems[C]// Advances in Cryptology-CRYPTO'89. Berlin:Springer, 1989: 1-14.
|
[2] |
YANG W , LUO W , LUO X ,et al. Fully distributed certificateless threshold signature without random oracles[J]. Science China(Information Sciences), 2018,61(9): 259-269.
|
[3] |
张艳硕, 李文敬, 陈雷 ,等. 基于特征值的可验证特殊门限秘密共享方案[J]. 通信学报, 2018,39(8): 169-175.
|
|
ZHANG Y S , LI W J , CHEN L ,et al. Verifiable special threshold secret sharing scheme based on eigenvalue[J]. Journal on Communications, 2018,39(8): 169-175.
|
[4] |
LIBERT B , YUNG M . Adaptively secure non-interactive threshold cryptosystems[C]// International Conference on Automata. Berlin:Springer, 2011: 588-600.
|
[5] |
ZHOU G , ZENG P , YUAN X ,et al. An efficient code-based threshold ring signature scheme with a leader-participant model[J]. Security &Communication Networks,2017, 2017:1.
|
[6] |
LI J , YUEN T H , KIM K . Practical threshold signatures without random oracles[C]// International Conference on Provable Security. Berlin:Springer, 2007: 198-207.
|
[7] |
陈立全, 朱政, 王慕阳 ,等. 适用于移动互联网的门限群签名方案[J]. 计算机学报, 2018,41(5): 86-101.
|
|
CHEN L Q , ZHU Z , WANG M Y ,et al. A threshold group signature scheme for mobile Internet application[J]. Chinese Journal of Computers, 2018,41(5): 86-101.
|
[8] |
任艳丽, 徐丹婷, 张新鹏 ,等. 基于门限环签名的可删除区块链[J]. 通信学报, 2019,40(4): 75-86.
|
|
REN Y L , XU D T , ZHANG X P ,et al. Deletable blockchain based on threshold ring signature[J]. Journal on Communications, 2019,40(4): 75-86.
|
[9] |
徐明, 李旭如, 刘朝斌 ,等. 基于双重代理密钥的船舶自组网门限签名方案[J]. 通信学报, 2018,39(7): 170-179.
|
|
XU M , LI X R , LIU C B ,et al. Dual-proxy key-based threshold signature scheme for ship ad-hoc network[J]. Journal on Communications, 2018,39(7): 170-179.
|
[10] |
MOWBRAY M , PEARSON S , SHEN Y . Enhancing privacy in cloud computing via policy-based obfuscation[J]. Journal of Supercomputing, 2012,61(2): 267-291.
|
[11] |
SHI Y , ZHANG Q , LIANG J W ,et al. Obfuscatable anonymous authentication scheme for mobile crowd sensing[J]. IEEE Systems Journal, 2018,PP(99): 1-12.
|
[12] |
BARAK B , GOLDREICH O , IMPSGLIAZZO R ,et al. On the (im)possibility of obfuscating programs[J]. Lecture Notes in Computer Science, 2001,2139(2): 1-18.
|
[13] |
HOHENBERGER S , ROTHBLUM G N , SHELAT A ,et al. Securely obfuscating re-encryption[M]. Berlin: SpringerPress, 2007.
|
[14] |
HADA S , . Secure obfuscation for encrypted signatures[C]// International Conference on Theory & Applications of Cryptographic Techniques. Berlin:Springer, 2010: 92-112.
|
[15] |
WATERS B , . Efficient identity-based encryption without random oracles[C]// International Conference on the Theory & Applications of Cryptographic Techniques. Berlin:Springer, 2005: 14-127.
|
[16] |
BONEH D , BOYEN X , SHACHAM H . Short group signatures[C]// 24th Annual International Cryptology Conference. Springer Berlin, 2004: 41-55.
|
[17] |
SHI Y , ZHAO Q P , FAN H F ,et al. Secure obfuscation for encrypted group signatures[J]. Plos One, 2015,10(7):1.
|
[18] |
陈兴发, 高崇志, 姚正安 ,等. 安全加密的环签名混淆器[J]. 中山大学学报(自然科学版), 2014,53(1): 8-17.
|
|
CHEN X F , GAO C Z , YAO Z A ,et al. Secure obfuscation for encrypted ring signatures[J]. Acta Scientiarum Naturalium Universitatis Sunyatseni, 2014,53(1): 8-17.
|
[19] |
SHI Y , HAN J X , FAN H F ,et al. Protecting encrypted signature functions against intrusions on computing devices by obfuscation[J]. IEEE Access, 2016,4: 6401-6415.
|
[20] |
TAKAGI T , OKAMOTO T , OKAMOTO E ,et al. Pairing-based cryptography–pairing 2007[M]. Berlin: SpringerPress, 2007.
|