[1] |
AL-RIYAMI S S , PATERSON K G . Certificateless public key cryp-tography[A]. Proc of Asiacrypt 2003[C]. Springer-Verlag, Berlin, 2003.452-473.
|
[2] |
CHOI K Y , PARK J H , HWANG J Y , et al. Efficient certificateless signature schemes[A]. Proc of the ACNS 2007 LNCS 4521[C]. Hei-delberg: Springer-Verlag, 2007. 443-458.
|
[3] |
HARN L , REN J , LIN C L . Design of DL-basedcertificateless digital signatures[J]. Journal of Systems and Software, 2009,82(5): 789-793.
|
[4] |
LIPPOLD G , BOYD C , NIETO J M G . Efficient certificateless KEM in the standard model[A]. roc of the ICISC 2009 LNCS 5984[C]. Heidelberg: Springer-Verlag, 2010. 34-46.
|
[5] |
TSO R , KIM C , YI X . Certificateless message recovery signatures providing girault's level-3 security[J]. Journal of Shanghai Jiaotong University(Science), 2011,16(5): 577-583.
|
[6] |
HUANG X , MU Y , SUSILO W , et al. Certificateless signatures: new schemes and security models[J]. The Computer Journal, 2012,55(4): 457-474.
|
[7] |
HU B , WONG D , ZHANG Z , et al. Key replacement attack against a generic construction of certificateless signature[A]. Proc of the 11th Australasian Conference on Information Security and Privacy[C]. Mel-bourne, Australia, 2006. 235-246.
|
[8] |
YAP W S , HENG S H , GOI B M An efficient certificateless signa-ture scheme[A]. Emerging Directions in Embedded and Ubiqui-ous Computing: EUC 2006, LNCS 4097[C]. Berlin: Springer-Verlag, 2006.322-331.
|
[9] |
LI J G , HUANG X Y , MU Y , et al. Cryptanalysis and improvement of an efficient certificateless signature scheme[J]. Journal of Communi-cations and Networks, 2008,10(1):10-17.
|
[10] |
TIAN M , HUAN L . Cryptanalysis of a certificateless signature sche-mewithout pairings[EB/OL]. , 2012.
|
[11] |
HE D , CHEN J , ZHANG R . An efficient and provably-secure certifi-cateless signature scheme without bilinear pairings[J]. International Journal of Communication Systems, 2012,25(11):1432-1442.
|
[12] |
王亚飞, 张睿皙 . 强安全无对的无证书签名方案[J]. 通信学报, 2013,34(2):94-100. WANG Y F , ZHANG R Z . Strongly secure certificateless signature scheme without pairings[J]. Journal on Communications, 2013,34(2):94-100.
|
[13] |
王圣宝, 刘文浩, 谢琪 . 无双线性配对的无证书签名方案[J]. 通信学报, 2012,33(4):93-98. WANG S B , LIU W H , XIE Q . Certificateless signature scheme with-out bilinear pairings[J]. Journal on Communications, 2012,33(4):93-98.
|
[14] |
HUANG X Y , SUSILO W , MU Y , et al. On the security of certificate-less signature schemes from asiacrypt 2003[A]. Proc of the CANS 2005 LNCS 3810[C]. Heidelberg: Springer-Verlag 2005. 13-25.
|
[15] |
CHEN L , CHENG Z , SMART N P . Identity-based key agreementpro-tocols from pairings[J]. Int J Inf Secur, 2007,6(4): 213-241.
|
[16] |
COURTOI N , KLIMOV A , PATARIN J . Efficient algorithms for solving overdefined systems of multivariate polynomial equations[A]. EUROCRYPT 2000[C]. Berlin, Germany, 2000. 392-407.
|