[1] |
FIAT A , SHAMIR A . How to prove yourself:practical solutions to identification and signature problems[C]// Advances in Cryptology-CRYPTO’ 86. Berlin:Springer, 1987: 186-194.
|
[2] |
SCHNORR C P . Efficient signature generation by smart cards[J]. Journal of Cryptology, 1991,4(3): 161-174.
|
[3] |
GUILLOU L C , QUISQUATER J J . A practical zero-knowledge protocol fitted to security microprocessor minimizing both transmission and memory[C]// Workshop on Advances in Cryptology-Eurocrypt. Berlin:Springer, 1988: 123-128.
|
[4] |
SHAMIR A , . Identity-based cryptosystems and signature schemes[C]// International Cryptology Conference. Berlin:Springer, 1985: 47-53.
|
[5] |
KUROSAWA K , HENG S . Identity-based identification without random oracles[C]// International Conference on Computational Science and Its Applications. Berlin:Springer, 2005: 603-613.
|
[6] |
BONEH D , BOYEN X . Short signatures without random oracles[C]// Theory and Application of Cryptographic Techniques. Berlin:Springer, 2004: 56-73.
|
[7] |
CHIN J J , HENG S H , GOI B M . An efficient and provable secure identity-based identification scheme in the standard model[C]// Public Key Infrastructure,5th European PKI Workshop:Theory and Practice,EuroPKI. Berlin:Springer, 2008: 60-73.
|
[8] |
BARAPATRE P , RANGAN C P . Identity-based identification schemes from ID-KEMs[C]// International Conference on Security. Berlin:Springer, 2013: 111-129.
|
[9] |
SAHAI A , WATERS B . Fuzzy identity-based encryption[C]// International Conference on Theory and Applications of Cryptographic Techniques. Berlin:Springer, 2005: 457-473.
|
[10] |
GOVAL V , PANDEY O , SAHAI A ,et al. Attribute-based encryption for fine-grained access control of encrypted data[C]// Proceedings of the 13th ACM Conference on Computer and Communications Security. New York:ACM Press, 2006: 89-98.
|
[11] |
BETHENCOURT J , SAHAI A , WATERS B . Ciphertext-policy attribute-based encryption[C]// IEEE Symposium on Security and Privacy. Piscataway:IEEE Press, 2007: 321-334.
|
[12] |
MAJI H , PRABHAKARAN M , ROULEK M . Attribute-based signatures[C]// Topics in Cryptology-CT-RSA. Berlin:Springer, 2011: 376-392.
|
[13] |
TANG F , LI H , LIANG B . Attribute-based signatures for circuits from multilinear maps[C]// International Conference on Information Security. Berlin:Springer, 2014: 54-71.
|
[14] |
LI J , AU M H , SUSILO W ,et al. Attribute-based signature and its applications[C]// ACM Symposium on Information. New York:ACM Press, 2010: 60-69.
|
[15] |
OKAMOTO T , TAKASHIMA K . Efficient attribute-based signatures for non-monotone predicates in the standard model[J]. IEEE International Conference on Cloud Computing Technology and Science, 2014,2(4): 409-421.
|
[16] |
YONEYANAMA K , . Strongly secure two-pass attribute-based authenticated key exchange[C]// International Conference on Pairing-Based Cryptography. Saarland:DBLP, 2010: 147-166.
|
[17] |
TANG F , ZHANG R , LI H . Attribute-based non-interactive key exchange[J]. Science China Information Sciences, 2017,60(2): 206.
|
[18] |
ANADA H , ARITA S , HANDA S ,et al. Attribute-based identification:definitions and efficient constructions[C]// Australasian Conference on Information Security and Privacy. Berlin:Springer, 2013: 168-186.
|
[19] |
CHASE M , . Multi-authority attribute based encryption[C]// Theory of Cryptography Conference. Berlin:Springer, 2007: 515-534.
|
[20] |
LIN H , CAO Z , LIANG X ,et al. Secure threshold multi authority attribute based encryption without a central authority[J]. Information Sciences, 2010,180(13): 2618-2632.
|
[21] |
GENNARO R , JARECKI S , KRAWCZYK H ,et al. Secure distributed key generation for discrete-log based cryptosystems[C]// Theory and Application of Cryptographic Techniques. Berlin:Springer, 1999: 295-310.
|
[22] |
TANG F , MA S , XIANG Y ,et al. An efficient authentication scheme for blockchain-based electronic health records[J]. IEEE Access, 2019,7: 41678-41689.
|
[23] |
CAO D , ZHAO B , WANG X ,et al. Multi-authority attribute-based signature[C]// Third International Conference on Intelligent Networking and Collaborative Systems. Piscataway:IEEE Press, 2011: 668-672.
|
[24] |
LIU X , ZHANG R , XUE R ,et al. Multi-central-authority attribute-based signature[C]// Proceedings of the 2012 Fourth International Symposium on Information Science and Engineering. New York:ACM Press, 2012: 173-178.
|
[25] |
GUO R , SHI H , ZHAO Q ,et al. Secure attribute-based signature scheme with multiple authorities for blockchain in electronic health records systems[J]. IEEE Access, 2018,6: 11676-11686.
|
[26] |
莫若, 马建峰, 刘西蒙 ,等. 支持树形访问结构的多权威基于属性的签名方案[J]. 通信学报, 2017,38(7): 96-104.
|
|
MO R , MA J F , LIU X M ,et al. Multi-authority ABS supporting dendritic access structure[J]. Journal on Communications, 2017,38(7): 96-104.
|
[27] |
张凯, 马建峰, 李辉 ,等. 支持高效撤销的多机构属性加密方案[J]. 通信学报, 2017,38(3): 83-91.
|
|
ZHANG K , MA J F , LI H ,et al. Multi-authority attribute-based encryption with efficient revocation[J]. Journal on Communications, 2017,38(3): 83-91.
|
[28] |
路世翠 . 电子凭据服务系统的多元身份管理机制研究[D]. 西安电子科技大学, 2019.
|
|
LU S C . Research on the multi-identity management mechanism of electronic credential service system[D]. Xi’an:Xidian University, 2019.
|
[29] |
张敏, 何远德, 张阳 . 多服务器环境下可实现访问控制的身份认方案[J]. 计算机工程与应用, 2017,53(17): 123-129.
|
|
ZHANG M , HE Y D , ZHANG Y . Authentication scheme for multi-server enviroment based on Chebyshev chaotic map with access control[J]. Computer Engineering and Applications, 2017,53(17): 123-129.
|