[13] |
HE J J , ZHANG F , SHAO H . Analysis and improvement of a certificateless partial blind signature scheme[J]. Journal of Xinyang Normal University:Natural Science Edition, 2014,27(2): 170-175.
|
[14] |
杨俊芳 . 部分盲签名研究及其应用[D]. 南昌:华东交通大学, 2016.
|
|
YANG J F . Research and Application of partial Blind signature[D]. Nanchang:East China Jiaotong University, 2016.
|
[15] |
张雪锋, 彭华 . 一种基于 SM9 算法的盲签名方案研究[J]. 信息网络安全, 2019,19(8): 61-67.
|
|
ZHANG X F , PENG H . Research on a Blind signature scheme based on SM9 algorithm[J]. Information Network Security, 2019,19(8): 61-67.
|
[16] |
何德彪, 张语荻, 张宇波 ,等. 一种基于SM9数字签名的盲签名生成方法及系统:中国,CN201810333911.4[P]. 2018-04-13.
|
|
HE D B , ZHANG Y D , ZHANG Y B ,et al. A blind signature generation method and system based on SM9 digital signature:China,CN201810333911.4[P]. 2018-04-13.
|
[17] |
苏志图 . 双线性对的快速计算研究[D]. 西安:西安电子科技大学, 2012.
|
|
SU Z T . Study on the fast calculation of bilinear pairs[D]. Xi'an:Xi'an University of Electronic Science and Technology, 2012.
|
[18] |
赵昌安 . 双线性对的有效计算[D]. 广州:中山大学, 2008.
|
|
ZHAO C A . Efficient calculation of bilinear pairs[D]. Guangzhou:Sun Yat-sen University, 2008.
|
[19] |
赵昌安, 张方国 . 双线性对有效计算研究进展[J]. 软件学报, 2009,20(11): 3001-3009.
|
|
ZHAO C A , ZHANG F G . Research progress of bilinear pair effective computation[J]. Journal of Software, 2009,20(11): 3001-3009.
|
[20] |
李彬, 王新梅 . 高效的 R-ate 对的参数构造方法[J]. 通信学报, 2010,31(1): 118-121.
|
|
LI B , WANG X M . An efficient parameter construction method for R-ate pairs[J]. Journal on Communication, 2010,31(1): 118-121.
|
[21] |
甘植旺, 廖方圆 . 国密SM9中R-ate双线性对快速计算[J]. 计算机工程, 2019,45(6): 171-174.
|
|
GAN Z W , LIAO F Y . Fast calculation of R-ate bilinear pairs in national secret SM9[J]. Computer Engineering, 2019,45(6): 171-174.
|
[22] |
张骁, 周清雷, 李斌 . 基于HRCA的可重构SM4密码算法研究与实现[J]. 网络与信息安全学报, 2020,6(5): 101-109.
|
[1] |
KOBLITZ N I . Introduction to elliptic curves and modular forms[M]. Springer Science & Business Media, 2012.
|
[2] |
MILLER V S , . Use of elliptic curves in cryptography[C]// Conference on the Theory and Application of Cryptographic Techniques. Springer,Berlin,Heidelberg, 1998: 417-426.
|
[22] |
ZHANG X , ZHOU Q L , LI B . Research and implementation of Reconfigurable SM4 cryptographic algorithm based on HRCA[J]. Journal of Network and Information Security, 2020,6(5): 101-109.
|
[23] |
吴邱涵, 胡卫 . 基于 SM2 算法和区块链的移动端身份认证协议设计[J]. 网络与信息安全学报, 2018,4(9): 60-65.
|
[3] |
SHAMIR A , . Identity-based cryptography and signature schemes[C]// Proceedings of CRYPTO'84. 1984.
|
[4] |
SAKAI R , . Cryptosystems based on pairing[C]// SCIS2000. 2000.
|
[5] |
BONEH D , FRANKLIN M . Identity-based encryption from the Weil pairing[C]// Annual International Cryptology Conference. 2001: 213-229.
|
[6] |
袁峰, 程朝辉 . SM9 标识密码算法综述[J]. 信息安全研究, 2016,2(11): 1008-1027.
|
|
YUAN F , CHENG C H . A survey of SM9 identity cryptography algorithms[J]. Research on Information Security, 2016,2(11): 1008-1027.
|
[7] |
CHAUM D . Blind signatures for untraceable payments[J]. Advances in Cryptology, 1983: 199-203.
|
[8] |
BRANDS S , . Restrictive binding of secret-key certificates[C]// International Conference on the Theory and Applications of Cryptographic Techniques. 1995: 231-247.
|
[9] |
ABE M , FUJISAKI E . How to date blind signatures[C]// International Conference on the Theory and Application of Cryptology and Information Security. 1996: 244-251.
|
[10] |
GMT 0044-2016 SM9标识密码算法:第5部分 参数定义[R].
|
|
GMT 0044-2016 SM9 identity cipher algorithm:part 5 Parameter Definitions[R].
|
[11] |
汤志鹏, 李晓雄, 左黎明 ,等. 高效安全无证书部分盲签名[J]. 计算机工程与设计, 2013,34(02): 339-446.
|
|
TANG Z P , LI X X , ZUO L M ,et al. Efficient,secure,certificateless partial blind signature[J]. Computer Engineering and Design, 2013,34(02): 339-446.
|
[12] |
余丹, 杨晓元, 黄大威 . 新的无证书部分盲签名方案[J]. 计算机应用研究, 2010,27(11): 4319-4321.
|
|
YU D , YANG X Y , HUANG D W . A new certificateless partial blind signature scheme[J]. Computer Application Research, 2010,27(11): 4319-4321.
|
[13] |
何俊杰, 张帆, 绍辉 . 对一个无证书部分盲签名方案的分析与改进[J]. 信阳师范学院学报:自然科学版, 2014,27(2): 170-175.
|
[23] |
WU Q H , HU W . Design of mobile authentication protocol based on SM2 algorithm and block chain[J]. Journal of Network and Information Security, 2018,4(9): 60-65.
|