JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE) ›› 2015, Vol. 50 ›› Issue (11): 52-59.doi: 10.6040/j.issn.1671-9352.0.2014.442
Previous Articles Next Articles
NONG Qiang, HUANG Zhen-jie, HUANG Ru-fen
CLC Number:
[1] AL-RIYAMI S, PATERSON K. Certificateless public key cryptography[C]//Advances in Cryptology-Asiacrypt 2003.Berlin:Springer, 2003:452-473. [2] BONEH D, GENTRY C, LYNN B, et al.Aggregate and verifiably encrypted signatures from bilinear maps[C]//Proceedings of Cryptology-Eurocrypt 2003. Berlin:Springer, 2003:416-432. [3] GONG Zheng, LONG Yu, HONG Xuan, et al. Two certificateless aggregate signatures from bilinear maps[C]//Proceedings of IEEE SNPD 2007. Washington:IEEE Computer Society, 2007:188-193. [4] ZHANG Lei, QIN Bo, WU Qianhong, et al. Efficient many-to-one authentication with certificateless aggregate signatures[J]. Computer Networks, 2010, 54(14):2482-2491. [5] XIONG Hu, GUAN Zhi, CHEN Zhong, et al. An efficient certificateless aggregate signature with constant pairing computations[J]. Information Science, 2013, 219:225-235. [6] ZHANG Futai, SHEN Limin, WU Ge. Notes on the security of certificateless aggregate signature schemes[EB/OL].[2014-04-24]. http://dx.doi.org/10.1016/j.ins.2014.07.019. [7] 侯红霞, 张雪锋, 董晓丽. 改进的无证书聚合签名方案[J]. 山东大学学报:理学版, 2013, 48(9):29-34. HOU Hongxia, ZHANG Xuefeng, DONG Xiaoli. Improved certificateless aggregate signature scheme[J]. Journal of Shandong University:Natural Science, 2013, 48(9):29-34. [8] CAO Xuefei, KOU Weidong, DU Xiaoni. A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges[J]. Information Sciences, 2010, 180(15):2895-2903. [9] RAFAEL C, RICARDO D.Two notes on the security of certificateless signatures[C]//Proceedings of ProvSec 2007. Berlin:Springer, 2007:85-102. [10] KOBLITZ N, MENEZES A, VANSTONE S. The state of elliptic curve cryptography[J]. Designs, Codes and Cryptography, 2000, 19(2-3):173-193. [11] ZHANG Yanchao, LIU Wei, LOU Wenjing, et al. Securing mobile Ad Hoc networks with certificateless public keys[J]. IEEE Transactions on Dependable and Secure Computing, 2006, 3(4):386-399. |
[1] | . Cryptanalysis and improvement of two kind of certificateless aggregate signature schemes [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(7): 107-114. |
[2] | ZHU Bin-rui, QIN Jing, HAN Fei. Searchable encryption scheme based on biometrics [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(5): 78-86. |
[3] | FAN Ai-wan, XIA Dong-liang, YANG Zhao-feng. Security analysis and improvement of two certificateless aggregate signature schemes [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2015, 50(09): 42-48. |
[4] | HOU Hong-xia1,2, ZHANG Xue-feng2, DONG Xiao-li2. Improved certificateless aggregate signature scheme [J]. J4, 2013, 48(09): 29-34. |
[5] | ZHANG Fang-guo. Elliptic curves in cryptography: past, present and future… [J]. J4, 2013, 48(05): 1-13. |
[6] | WU Lei 1, KONG Fanyu 2. An efficient IDbased proxy ring signature scheme [J]. J4, 2009, 44(1): 40-43 . |
[7] | LIU Xiao-dong,JIANG Ya-li,LI Da-xing . Two biometric identities based signature schemes [J]. J4, 2007, 42(12): 24-28 . |
[8] | LI Guo-wei,LI Ru-peng and LI Da-xing . Analysis and improvement of Wang threshold signature scheme [J]. J4, 2007, 42(1): 55-58 . |
|