[1] |
SHAMIR A , . Identity-based cryptosystems and signature schemes[C]// Advances in Cryptology. Berlin:Springer, 1984: 47-53.
|
[2] |
CHA J C , . An identity-based signature from gap Diffie-Hellman groups[C]// Public Key Cryptography — PKC 2003. Berlin:Springer, 2003: 18-30.
|
[3] |
PATERSON K G , SCHULDT J C N . Efficient identity-based signatures secure in the standard model[C]// Information Security and Privacy. Berlin:Springer, 2006: 207-222.
|
[4] |
杨小东, 杨苗苗, 高国娟 ,等. 强不可伪造的基于身份服务器辅助验证签名方案[J]. 通信学报, 2016,37(6): 49-55.
|
|
YANG X D , YANG M M , GAO G J ,et al. ID-based server-aided verification signature scheme with strong unforgeability[J]. Journal on Communications, 2016,37(6): 49-55.
|
[5] |
刘翔宇, 刘胜利, 谷大武 . 紧致安全的基于身份的签名方案[J]. 密码学报, 2021,8(1): 132-141.
|
|
LIU X Y , LIU S L , GU D W . Tightly secure identity-based signature scheme[J]. Journal of Cryptologic Research, 2021,8(1): 132-141.
|
[6] |
田苗苗, 陈静, 仲红 . 格上基于身份的增量签名方案[J]. 通信学报, 2021,42(1): 108-117.
|
|
TIAN M M , CHEN J , ZHONG H . Identity-based incremental signature scheme from lattices[J]. Journal on Communications, 2021,42(1): 108-117.
|
[7] |
侯红霞, 张明瑞, 赵艳琦 ,等. 素数阶群上基于非对称对的身份基环签名[J]. 通信学报, 2021,42(9): 155-164.
|
|
HOU H X , ZHANG M R , ZHAO Y Q ,et al. ID-based ring signature on prime order group from asymmetric pairing[J]. Journal on Communications, 2021,42(9): 155-164.
|
[8] |
ANDERSON R , . Two remarks on public key cryptology[C]// Invited Lecture at the 4th ACM Conference on Computer and Communications Security. New York:ACM Press, 1997: 1-5.
|
[9] |
BELLARE M , MINER S K . A forward-secure digital signature scheme[C]// Advances in Cryptology — CRYPTO’ 99. Berlin:Springer, 1999: 431-448.
|
[10] |
ITKIS G , REYZIN L . Forward-secure signatures with optimal signing and verifying[C]// Advances in Cryptology — CRYPTO 2001. Berlin:Springer, 2001: 332-354.
|
[11] |
KOZLOV A , REYZIN L . Forward-secure signatures with fast key update[C]// Security in Communication Networks. Berlin:Springer, 2003: 241-256.
|
[12] |
LIBERT B , QUISQUATER J J , YUNG M . Forward-secure signatures in untrusted update environments:efficient and generic constructions[C]// Proceedings of the 14th ACM Conference on Computer and Communications Security. New York:ACM Press, 2007: 266-275.
|
[13] |
ABDALLA M , REYZIN L . A new forward-secure digital signature scheme[C]// Advances in Cryptology-ASIACRYPT 2000. Berlin:Springer, 2000: 116-129.
|
[14] |
YU J , HAO R , KONG F Y ,et al. Forward-secure identity-based signature:security notions and construction[J]. Information Sciences, 2011,181(3): 648-660.
|
[15] |
GREEN M D , MIERS I . Forward secure asynchronous messaging from puncturable encryption[C]// Proceedings of 2015 IEEE Symposium on Security and Privacy. Piscataway:IEEE Press, 2015: 305-320.
|
[16] |
WATERS B , . Efficient identity-based encryption without random oracles[C]// Lecture Notes in Computer Science. Berlin:Springer, 2005: 114-127.
|
[17] |
魏江宏, 刘文芬, 胡学先 . 前向安全的密文策略基于属性加密方案[J]. 通信学报, 2014,35(7): 38-45.
|
|
WEI J H , LIU W F , HU X X . Forward-secure ciphertext-policy attribute-based encryption scheme[J]. Journal on Communications, 2014,35(7): 38-45.
|
[18] |
WEI J H , LIU W F , HU X X . Forward-secure identity-based signature with efficient revocation[J]. International Journal of Computer Mathematics, 2017,94(7): 1390-1411.
|
[19] |
OH H , KIM J , SHIN J S . Forward-secure ID based digital signature scheme with forward-secure private key generator[J]. Information Sciences, 2018,454/455: 96-109.
|
[20] |
杨小东, 李雨潼, 王晋利 ,等. 标准模型下可撤销的基于身份的代理重签名方案[J]. 通信学报, 2019,40(5): 153-162.
|
|
YANG X D , LI Y T , WANG J L ,et al. Revocable identity-based proxy re-signature scheme in the standard model[J]. Journal on Communications, 2019,40(5): 153-162.
|
[21] |
CANETTI R , HALEVI S , KATZ J . A forward-secure public-key encryption scheme[J]. Journal of Cryptology, 2007,20(3): 265-294.
|
[22] |
WEI J H , CHEN X F , WANG J F ,et al. Enabling (end-to-end) encrypted cloud emails with practical forward secrecy[J]. IEEE Transactions on Dependable and Secure Computing, 2021,PP(99): 1.
|
[23] |
DERLER D , GELLERT K , JAGER T ,et al. Bloom filter encryption and applications to efficient forward-secret 0-RTT key exchange[J]. Journal of Cryptology, 2021,34(2): 13.
|
[24] |
BELLARE M , STEPANOVS I , WATERS B . New negative results on differing-inputs obfuscation[C]// Advances in Cryptology – EUROCRYPT 2016. Berlin:Springer, 2016: 792-821.
|
[25] |
HALEVI S , ISHAI Y , JAIN A ,et al. Non-interactive multiparty computation without correlated randomness[C]// Advances in Cryptology –ASIACRYPT 2017. Berlin:Springer, 2017: 181-211.
|
[26] |
LI X Y , XU J , FAN X ,et al. Puncturable signatures and applications in proof-of-stake blockchain protocols[J]. IEEE Transactions on Information Forensics and Security, 2020,15: 3872-3885.
|
[27] |
BLOOM B H . Space/time trade-offs in hash coding with allowable errors[J]. Communications of the ACM, 1970,13(7): 422-426.
|
[28] |
AKINYELE J A , GARMAN C , MIERS I ,et al. Charm:a framework for rapidly prototyping cryptosystems[J]. Journal of Cryptographic Engineering, 2013,3(2): 111-128.
|