[1] |
LI X C . Blockchain-based group key agreement protocol for vehicular ad hoc networks[J]. Computer Communications, 2022,183: 107-120.
|
[2] |
CHEN J N , HUANG Z J , ZHOU Y P ,et al. Efficient certificate-based aggregate signature scheme for vehicular ad hoc networks[J]. IET Networks, 2020,9(6): 290-297.
|
[3] |
REN Y L , LI X Y,SUNSF ,et al. Privacy-preserving batch verification signature scheme based on blockchain for vehicular ad-hoc networks[J]. Journal of Information Security and Applications, 2021,58:102698.
|
[4] |
YANG X D , LIU R , WANG M D ,et al. Identity-based aggregate signature scheme in vehicle ad-hoc network[C]// Proceedings of 2019 4th International Conference on Mechanical,Control and Computer Engineering (ICMCCE). 2020: 1046-10463.
|
[5] |
MOHANTY S , JENA D , PANIGRAHY S K . A secure RSU-aided aggregation and batch-verification scheme for vehicular networks[C]// International Conference on Soft Computing and Its Applications (ICSCA’2012). 2012: 174-178.
|
[6] |
BONEH D , GENTRY C , LYNN B ,et al. Aggregate and verifiably encrypted signatures from bilinear maps[M]// Lecture Notes in Computer Science. 2003: 416-432.
|
[7] |
LI J , KIM K , ZHANG F G ,et al. Aggregate proxy signature and verifiably encrypted proxy signature[C]// Proceedings of the 1st International Conference on Provable Security. 2007: 208-217.
|
[8] |
AHN J H , GREEN M , HOHENBERGER S . Synchronized aggregate signatures:new definitions,constructions and applications[C]// Proceedings of the 17th ACM Conference on Computer and Communications Security. 2010: 473-484.
|
[9] |
NEVEN G . Efficient sequential aggregate signed data[J]. IEEE Transactions on Information Theory, 2011,57(3): 1803-1815.
|
[10] |
CHEON J H . A new ID-based signature with batch verification[R]. Cryptology Eprint Archive Report, 2004.
|
[11] |
SHEN L M , MA J F , LIUXM ,et al. A secure and efficient ID-based aggregate signature scheme for wireless sensor networks[J]. IEEE Internet of Things Journal, 2017,4(2): 546-554.
|
[12] |
IWASAKI T , YANAI N , INAMURA M ,et al. Tightly-secure identity-based structured aggregate signature scheme under the computational Diffie-Hellman assumption[C]// Proceedings of 2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA). 2016: 669-676.
|
[13] |
YANG X D , LIU R , WANG M D ,et al. Identity-based aggregate signature scheme in vehicle ad-hoc network[C]// Proceedings of 2019 4th International Conference on Mechanical,Control and Computer Engineering (ICMCCE). 2020: 1046-10463.
|
[14] |
CASTRO R , DAHAB R . Efficient certificate less signatures suitable for aggregation[J]. IACR Cryptol Eprint Arch,2007, 2007:454.
|
[15] |
XIONG H , GUAN Z , CHEN Z ,et al. An efficient certificateless aggregate signature with constant pairing computations[J]. Information Sciences, 2013,219: 225-235.
|
[16] |
HASHIMOTO K , OGATA W . Unrestricted and compact certificate less aggregate signature scheme[J]. Information Sciences, 2019,487: 97-114.
|
[17] |
GUO Y M , ZHANG Z F , GUO Y J . Anonymous authenticated key agreement and group proof protocol for wearable computing[J]. IEEE Transactions on Mobile Computing, 2022,21(8): 2718-2731.
|
[18] |
KUMAR V , KUMAR R , PANDEY S K . A computationally efficient centralized group key distribution protocol for secure multicast communications based upon RSA public key cryptosystem[J]. Journal of King Saud University-Computer and Information Sciences, 2020,32(9): 1081-1094.
|
[19] |
SRINIVAS J , DAS A K , KUMAR N ,et al. Cloud centric authentication for wearable healthcare monitoring system[J]. IEEE Transactions on Dependable and Secure Computing, 2020,17(5): 942-956.
|
[20] |
FIAT A , NAOR M . Broadcast encryption[C]// Annual International Cryptology Conference. 1993: 480-491.
|
[21] |
ZHONG H , ZHANGS , CUIJ ,et al. Broadcast encryption scheme for V2I communication in VANETs[J]. IEEE Transactions on Vehicular Technology, 2022,71(3): 2749-2760.
|
[22] |
GAO R H , ZENG J W , DENG L Z . Efficient certificate less anonymous multi-receiver encryption scheme without bilinear parings[J]. Mathematical Problems in Engineering, 2018,2018: 1-13.
|
[23] |
张泽林, 王化群 . 基于区块链的工业互联网动态密钥管理[J]. 计算机研究与发展, 2023,60(2): 386-397.
|
|
ZHANG Z L , WANG H Q . Dynamic key management of industrial Internet based on blockchain[J]. Journal of Computer Research and Development, 2023,60(2): 386-397.
|
[24] |
WANG H Q . Provably secure anonymous multi-receiver identity-based encryption with shorter ciphertext[C]// Proceedings of 2014 IEEE 12th International Conference on Dependable,Autonomic and Secure Computing. 2014: 85-90.
|
[25] |
BONEH D , FRANKLIN M . Identity-based encryption from the Weil pairing[M]// Advances in Cryptology — CRYPTO 2001. 2001: 213-229.
|
[26] |
MIYAJI A , NAKABAYASHI M , TAKANO S . Characterization of elliptic curve traces under FR-reduction[M]// Lecture Notes in Computer Science. 2001: 90-108.
|