[1] |
MICALI S , RIVEST R . Transitive signature schemes[A]. Proceedings of the Cryptographers' Track at the RSA Conference[C]. San Jose, 2002.236-243.
|
[2] |
BELLARE M , NEVEN G . Transitive signatures based on factoring and RSA[A]. Proceedings of the 8th International Confe on the Theory and Application of Cryptology and Information Security Queenstown[C]. New Zealand, 2002.397-414.
|
[3] |
HOHENHERGER S . The Cryptographic Impact of Groups with In-feasible Inversion[D]. Massachusetts Institute of Technology, 2003.
|
[4] |
KUWAKADO H , TANAKA H . Transitive signature scheme for di-rected trees[J]. IEICE Transactions on Fundamenta, 2003,E86- A(5): 1120-1126.
|
[5] |
VAN H E , PEDERSEN T P , PFITZMANN B . New constructions of fail-stop signatures and lower bounds[A]. Proceedings of the 12th Annual International Cryptology Conference[C]. Santa Barbara, 1992.15-30.
|
[6] |
YI X , TAN C H , OKAMOTO E . Security of kuwakado-tanaka transi-tive signature scheme for directed trees[J]. IEICE Tra tions on Fundamentals, 2004,E87- A(4): 955-957.
|
[7] |
ZHOU S J . Transitive Signatures Based on Non-Adaptive Standard Signatures[R]. Cryptography ePrint Archive Report, 2004.
|
[8] |
ZHU H . Model for undirected transitive signatures[J]. EE Proceed-ings Communications, 2004,151 (4): 312-315.
|
[9] |
SHAHANDASHTI S F , SALMADIZADEH M , MOHAJERI J . A provably secure short transitive signature scheme from bilinear group pairs[A]. Proceedings of the 4th International Conference on Security in Communication Networks[A]. Amalfi,Italy, 2004.60-76.
|
[10] |
BELLARE M , NEVEN G . Transitive signatures: new schemes and proofs[J]. IEEE Transactions on Information Theory, 2005,51 (6): 2133-2151.
|
[11] |
MA C G , WU P , GU G C . A new method for the design of stateless transitive signature scheme[A]. Proceedings of the APWeb International Workshops: XRA, IWSN, MEGA, and ICSE[C]. Haerbin, 2006.897-904.
|
[12] |
黄振杰, 郝艳华, 王育民 . 一个高效的有向传递签名方案[J]. 电子学报, 2005,33 (8): 1497-1501. HUANG Z J , HAO Y H , WANG Y M . Efficient directed trans tive scheme[J]. ACTA Electronica Sinica, 2005,33 (8): 1497-1501.
|
[13] |
YI X . Directed transitive signature scheme[A]. Proceedings of the Cryptographers' Track at the RSA Conference[C]. San Francisco, 2007.129-144.
|
[14] |
NEVEN G . A simple transitive signature scheme for directed trees[J]. Theoretical Computer Science, 2008,396 (1-3): 277-282.
|
[15] |
马春光, 蔡满春, 武朋 . 基于单向累加器的无向可传递闭包图认证[J]. 通信学报, 2008,29 (3): 63-69. MA C G , CAI M C , WU P . Transitively closed undirected au-thentication based on one-way accumulators[J]. Journal on Commu-nications, 2008,29 (3): 63-69.
|
[16] |
XU J . On Directed Transitive Signature[R]. Cryptology ePrint Archive, Report, 2009.
|
[17] |
ZHENG G , ZHENG H , QIU W D , et al Transitive signature scheme from LFSR[J]. Journal of Information Science and Engineering, 2010,26: 131-143.
|
[18] |
马小龙, 谷利泽, 崔巍 等. 标准模型下基于身份的传递签名[J]. 通信学报, 2010,31 (5): 37-43. MA X L , GU L Z , CUI W , et al. ID-based transitive signature schemes without random oracle[J]. Journal on Communications, 2010,31 (5): 37-43.
|
[19] |
CAMACHO P , HEVIA A . Short transitive signatures for directed trees[A]. Proceedings of the Cryptographers' Track at he RSA Con-ference[C]. San Francisco, 2012.35-50.
|
[20] |
KUN M , HAN L , KAIJIE W . Homomorphic property-based concur-rent error detection of RSA: a countermeasure to fault attack[J]. IEEE Transactions on Computers, 2012,61 (7): 1040-1049.
|
[21] |
GENTRY C . Fully homomorphic encryption using ideal lattices[A]. Proceedings of the 41st Annual ACM Symposium on Theory of Computing[C]. New York, 2009.169-178.
|