[1] |
RIVEST R L , SHAMIR A , TAUMAN Y . How to leak a secret[C]// Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security. Berlin:Springer, 2001: 552-565.
|
[2] |
SHAMIR A , . Identity-based cryptosystems and signature schemes[C]// International Cryptology Conference. Berlin:Springer, 1984: 47-53.
|
[3] |
CHOW S S M , LIU J K , WONG D S . Robust receipt-free election system with ballot secrecy and verifiability[C]// Proceedings of Network and Distributed System Security Symposium. Piscataway:IEEE Press, 2008: 81-94.
|
[4] |
TSANG P P , WEI V K . Short linkable ring signatures for E-voting,E-cash and attestation[C]// Proceedings of the 1th Information on Security Practice and Experience. Berlin:Springer, 2005: 48-60.
|
[5] |
QIU C , ZHANG S B , CHANG Y ,et al. Electronic voting scheme based on a quantum ring signature[J]. International Journal of Theoretical Physics, 2021,60(4): 1550-1555.
|
[6] |
李旭东, 牛玉坤, 魏凌波 ,等. 比特币隐私保护综述[J]. 密码学报, 2019,6(2): 133-149.
|
|
LI X D , NIU Y K , WEI L B ,et al. Overview on privacy protection in bitcoin[J]. Journal of Cryptologic Research, 2019,6(2): 133-149.
|
[7] |
陈思吉, 翟社平, 汪一景 . 一种基于环签名的区块链隐私保护算法[J]. 西安电子科技大学学报, 2020,47(5): 86-93.
|
|
CHEN S J , ZHAI S P , WANG Y J . Blockchain privacy protection algorithm based on ring signature[J]. Journal of Xidian University, 2020,47(5): 86-93.
|
[8] |
宋婷婷 . 车联网环境下环签名方案的研究[D]. 兰州:西北师范大学, 2020.
|
|
SONG T T . Research on ring signature scheme in the environment of Internet of vehicles[D]. Lanzhou:Northwest Normal University, 2020.
|
[9] |
ZHANG F G , KIM K . ID-based blind signature and ring signature from pairings[C]// Proceedings of the International Conference on the Theory and Application of Cryptology and Information Security. Berlin:Springer, 2002: 533-547.
|
[10] |
CHOW S S M , HUI L C K , YIU S M . Identity based threshold ring signature[C]// Proceedings of the 7th International Conference on Information Security & Cryptology. Berlin:Springer, 2004: 218-232.
|
[11] |
CHOW S S M , YIU S M , HUI L C K . Efficient identity based ring signature[C]// Proceedings of the Third international conference on Applied Cryptography and Network Security. Berlin:Springer, 2005: 499-512.
|
[12] |
CHEN Y Q , SUSILO W , MU Y . Identity-based anonymous designated ring signatures[C]// Proceeding of the 2006 International Conference on Communications and Mobile Computing. New York:ACM Press, 2006: 189-194.
|
[13] |
ZHOU C , CUI Z , GAO G . Efficient identity-based generalized ring signcryption scheme[J]. KSII Transactions on Internet and Information Systems, 2016,10(12): 6116-6134.
|
[14] |
邓伦治, 高岩, 高荣海 ,等. 一个高效的基于身份的环签名方案[J]. 贵州师范大学学报(自然科学版), 2021,39(1): 1-8.
|
|
DENG L Z , GAO Y , GAO R H ,et al. An efficient identity-based ring signature scheme[J]. Journal of Guizhou Normal University (Natural Sciences), 2021,39(1): 1-8.
|
[15] |
贾小英, 何德彪, 许芷岩 ,等. 格上高效的基于身份的环签名体制[J]. 密码学报, 2017,4(4): 392-404.
|
|
JIA X Y , HE D B , XU Z Y ,et al. An efficient identity-based ring signature scheme over a lattice[J]. Journal of Cryptologic Research, 2017,4(4): 392-404.
|
[16] |
赵艳红, 陈晓玲 . 基于身份及 RSA 的简短代理环签名方法[J]. 沈阳大学学报(自然科学版), 2018,30(4): 302-310.
|
|
ZHAO Y H , CHEN X L . A short proxy ring signature scheme based on identity and RSA[J]. Journal of Shenyang University (Natural Science), 2018,30(4): 302-310.
|
[17] |
CANETTI R , GOLDREICH O , HALEVI S . The random oracle methodology,revisited[J]. Journal of the ACM, 2004,51(4): 557-594.
|
[18] |
AU M H , LIU J K , YUEN T H ,et al. ID-based ring signature scheme secure in the standard model[C]// Advances in Information and Computer Security. Berlin:Springer, 2006: 1-16.
|
[19] |
张跃宇, 李晖, 王育民 . 标准模型下基于身份的环签名方案[J]. 通信学报, 2008,29(4): 40-44.
|
|
ZHANG Y Y , LI H , WANG Y M . Identity-based ring signature scheme under standard model[J]. Journal on Communications, 2008,29(4): 40-44.
|
[20] |
刘振华, 胡予濮, 牟宁波 ,等. 新的标准模型下基于身份的环签名方案[J]. 电子与信息学报, 2009,31(7): 1727-1731.
|
|
LIU Z H , HU Y P , MU N B ,et al. New identity-based ring signature in the standard model[J]. Journal of Electronics & Information Technology, 2009,31(7): 1727-1731.
|
[21] |
葛爱军, 马传贵, 张振峰 ,等. 标准模型下固定长度的基于身份环签名方案[J]. 计算机学报, 2012,35(9): 1874-1880.
|
|
GE A J , MA C G , ZHANG Z F ,et al. Identity-based ring signature scheme with constant size signatures in the standard model[J]. Chinese Journal of Computers, 2012,35(9): 1874-1880.
|
[22] |
AU M H , LIU J K , SUSILO W ,et al. Realizing fully secure unrestricted ID-based ring signature in the standard model based on HIBE[J]. IEEE Transactions on Information Forensics and Security, 2013,8(12): 1909-1922.
|
[23] |
赵艳琦, 来齐齐, 禹勇 ,等. 标准模型下基于身份的环签名方案[J]. 电子学报, 2018,46(4): 1019-1024.
|
|
ZHAO Y Q , LAI Q Q , YU Y ,et al. ID-based ring signature in the standard model[J]. Acta Electronica Sinica, 2018,46(4): 1019-1024.
|
[24] |
FREEMAN D M , . Converting pairing-based cryptosystems from composite-order groups to prime-order groups[C]// Proceedings of the 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Berlin:Springer, 2010: 44-61.
|
[25] |
RAMANNA S C , CHATTERJEE S , SARKAR P . Variants of waters’ dual system primitives using asymmetric pairings[C]// Proceedings of the 15th International Conference on Practice and Theory in Public Key Cryptography. Berlin:Springer, 2012: 298-315.
|
[26] |
WATERS B , . Dual system encryption:realizing fully secure IBE and HIBE under simple assumptions[C]// Proceedings of the 29th Annual International Cryptology Conference. Berlin:Springer, 2009: 619-636.
|
[27] |
CHATTERJEE S , MENEZES A . On cryptographic protocols employing asymmetric pairings—The role of Ψ revisited[J]. Discrete Applied Mathematics, 2011,159(13): 1311-1322.
|
[28] |
GALBRAITH S D , PATERSON K G , SMART N P . Pairings for cryptographers[J]. Discrete Applied Mathematics, 2008,156(16): 3113-3121.
|
[29] |
SMART N P , VERCAUTEREN F . On computable isomorphisms in efficient asymmetric pairing-based systems[J]. Discrete Applied Mathematics, 2007,155(4): 538-547.
|