[1] |
HAMIR A . Identity-based cryptosystems and signature schemes[A]. Blakely Proc Of Crypto'84,LNCS 196[C]. Berlin: Springer-Verlag, Germany, 1984.47-53.
|
[2] |
BE M , FUJISAKI E . How to date blind signatures[A]. Proc of ASIA-CRYPT[C]. London: Spring-Verlag, UK, 1996.244-251.
|
[3] |
RIYARNI S , PATERSOA K . Certificate less public key crypto-graph[A]. Proc of Asia CRYPT[C]. Berlin: Springer Verlag, Germany, 2003.452-473.
|
[4] |
HEN X F , ZHANG F G , KONIDALA D M , et al. New ID-based threshold signature scheme from Weil pairing[A]. INDO_CRYPT2004. LNCS 3348[C]. Berlin: Springer-Verlag, Germany, 2004.371-383.
|
[5] |
BESSIE C H , WONG D S , ZHANG Z F , et al. Certifieateless signa-ture: a new security model and an improved generic construction[J]. Designs, Codes and Cryptography, 2007,42 (2):109-126.
|
[6] |
HOI K Y , PARK J H , HWANQ J Y , et al. Efficient cerificateless sig-nature schemes[A]. Proc of the 5th International Conference on Ap-plied Cryptography and Network Security[C]. Berlin: Springer-Verlag, Germany, 2007.443-458.
|
[7] |
陆洪文, 郑卓 . 基于双线性对的门限部分盲签名方案[J]. 计算机应用, 2005,25(9):2057-2059. LU H W , ZHENG Z . Threshold bilinear pairings partially blind signa-ture scheme[J]. Computer Applications, 2005,25(9):2057-2059.
|
[8] |
IOVANNI D C , GONZALO A , RENWEI G . Threshold cryptography in mobile ad hoc networks[A]. SCN 2004[C]. Berlin, Heidelberg, NewYork: Springer-Verlag, 2005.91-104.
|
[9] |
ABE M , FUJISAKI E . How to date blind signatures[A]. Advances inCryp-tology-AisaCrypt'96[C]. Heidelberg: Springer-Verlag, Germany, 1996.244-251.
|
[10] |
ZHANG F , SAFAVI N R , SUSILO W . Efficient verifiably encrypted signature and partially blind signature from bilinear pairings[A]. Cryptology-Indocrypt 2003, 4th International Conference on Cryptol-ogy[C]. Heidelberg: Springer-Verlag, Germany, 2003.71-84.
|
[11] |
OKAMOTO T . Efficient blind and partially blind signatures without-random oracles[A]. Third Theory of Cryptography Conference, TCC 2006[C]. Heidelberg: Springer-Verlag, Germany, 2006.80-99.
|
[12] |
ZHANG F , KIM K . Efficient ID-based blind signature and proxy signa-ture from bilinear pairings[A]. 8th Australasian Conference on Informa-tion Security and Privacy[C]. Wollongong, Australia, 2003.312-323.
|
[13] |
CHEN X , ZHANG F , LIU S . ID-based restrictive partially blind sig-naturesand applications[J]. Journal of System and Software, 2007,80 (2):164-171.
|
[14] |
CHOW S , HUI L , YIU S , et al. Two improved partially blind signature schemes from bilinear pairings[A]. 10thAustralian Conference on In-formation Security and Privacy[C]. Heidelberg: Springer-Verlag[C]. Heidelberg: Springer-Verlag, 2005.316-328.
|
[15] |
HU X , HUANG S . An efficient id-based partially blind signature scheme[A]. IEEE Eighth International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing[C]. Qingdao, China, 2007.291-296.
|