[1] |
GUPTA L , JAIN R , VASZKUN G . Survey of important issues in UAV communication networks[J]. IEEE Communications Surveys & Tutorials, 2016,18(2): 1123-1152.
|
[2] |
MAJI H K , PRABHAKARAN M , ROSULEK M . Attribute-based signatures[C]// 2011 Cryptographers' Track at the RSA Conference. Berlin:Springer, 2011: 376-392.
|
[3] |
LI J , KIM K . Hidden attribute-based signatures without anonymity revocation[J]. Information Sciences, 2010,180(9): 1681-1689.
|
[4] |
LI J , AU M H , SUSILO W ,et al. Attribute-based signature and its applications[C]// Proceedings of the 5th ACM Symposium on Information,Computer and Communications Security. New York:ACM Press, 2010: 60-69.
|
[5] |
莫若, 马建峰, 刘西蒙 ,等. 一种支持树形访问结构的属性基可净化签名方案[J]. 电子学报, 2017,45(11): 2715-2720.
|
|
MO R , MA J F , LIU X M ,et al. An attribute-based sanitizable signature supporting dendritic access structure[J]. Acta Electronica Sinica, 2017,45(11): 2715-2720.
|
[6] |
GU K , JIA W J , WANG G J ,et al. Efficient and secure attribute-based signature for monotone predicates[J]. Acta Informatica, 2017,54(5): 521-541.
|
[7] |
莫若, 马建峰, 刘西蒙 ,等. 支持树形访问结构的多权威基于属性的签名方案[J]. 通信学报, 2017,38(7): 96-104.
|
|
MO R , MA J F , LIU X M ,et al. Multi-authority ABS supporting dendritic access structure[J]. Journal on Communications, 2017,38(7): 96-104.
|
[8] |
GUO R , SHI H X , ZHAO Q L ,et al. Secure attribute-based signature scheme with multiple authorities for blockchain in electronic health records systems[J]. IEEE Access, 2018,6: 11676-11686.
|
[9] |
YANG R L , CHEN J G , LI S L . Secure and traceable attribute-based sequential aggregate signature[C]// 2020 International Conference on Security,Privacy and Anonymity in Computation,Communication and Storage. Berlin:Springer, 2020: 367-381.
|
[10] |
CHEN X F , LI J , HUANG X Y ,et al. Secure outsourced attribute-based signatures[J]. IEEE Transactions on Parallel and Distributed Systems, 2014,25(12): 3285-3294.
|
[11] |
MO R , MA J F , LIU X M ,et al. EOABS:expressive outsourced attribute-based signature[J]. Peer-to-Peer Networking and Applications, 2018,11(5): 979-988.
|
[12] |
CUI H , DENG R H , LIU J K ,et al. Server-aided attribute-based signature with revocation for resource-constrained industrial-Internet-of-things devices[J]. IEEE Transactions on Industrial Informatics, 2018,14(8): 3724-3732.
|
[13] |
XIONG H , BAO Y Y , NIE X Y ,et al. Server-aided attribute-based signature supporting expressive access structures for industrial Internet of things[J]. IEEE Transactions on Industrial Informatics, 2020,16(2): 1013-1023.
|
[14] |
张应辉, 贺江勇, 郭瑞 ,等. 工业物联网中服务器辅助且可验证的属性基签名方案[J]. 计算机研究与发展, 2020,57(10): 2177-2187.
|
|
ZHANG Y H , HE J Y , GUO R ,et al. Server-aided and verifiable attribute-based signature for Industrial Internet of things[J]. Journal of Computer Research and Development, 2020,57(10): 2177-2187.
|
[15] |
BAO Y Y , QIU W D , CHENG X C . Efficient and fine-grained signature for IIoT with resistance to key exposure[J]. IEEE Internet of Things Journal, 2021,8(11): 9189-9205.
|
[16] |
MAMBO M , USUDA K , OKAMOTO E . Proxy signatures for delegating signing operation[C]// Proceedings of the 3rd ACM Conference on Computer and Communications Security. New York:ACM Press, 1996: 48-57.
|
[17] |
HUANG X Y , SUSILO W , MU Y ,et al. Proxy signature without random oracles[C]// 2006 2nd International Conference on Mobile Ad-Hoc and Sensor Networks. Berlin:Springer, 2006: 473-484.
|
[18] |
WU W , MU Y , SUSILO W ,et al. Identity-based proxy signature from pairings[C]// 2007 4th International Conference on Autonomic and Trusted Computing. Berlin:Springer, 2007: 22-31.
|
[19] |
LIU X M , MA J F , XIONG J B ,et al. Personal health records integrity verification using attribute-based proxy signature in cloud computing[C]// 2013 6th International Conference on Internet and Distributed Computing Systems. Berlin:Springer, 2013: 238-251.
|
[20] |
SUN C X , GUO Y F , LI Y L . One secure attribute-based proxy signature[J]. Wireless Personal Communications, 2018,103(2): 1273-1283.
|
[21] |
CARO A D , IOVINO V . jPBC:Java pairing based cryptography[C]// 2011 IEEE Symposium on Computers and Communications. Piscataway:IEEE Press, 2011: 850-855.
|