1A Shamir.Identity-based cryptosystems and signature schemes[C].In: Advances in Cryptology-Crypto 84, LNCS 196,Springer-Verlag, 1984 : 47-53. 被引量:1
2D Boneh,M Franklin.Identity-based Encryption from the Weil pairing[C].In : Proc of Crypto 2001 ,LNCS 2139,Springer -Verlag,2001 : 213-229. 被引量:1
3S S Al-Riyami ,K G Paterson. Certificateless Public Key Cryptography[C].In:Advances in Cryptography-Asiacrypt 2003,LNCS 2894, Springer-Verlag, Berlin, 2003 : 452-473. 被引量:1
4D H Yum,P J Lee.Generic Construction of Certificateless Signature[C]. In:Information Security and Privacy,ACISP 2004,LNCS 3108,Springer- Verlag, Berlin, 2004: 200-211. 被引量:1
5J H Silverman.The Arithmetic of Elliptic Curvers[J].Graduate Texts in Mathematic, Springer-Verlag, 1986; 106 : 96-99. 被引量:1
6F Hess.Exponent group signature schemes and efficient identity based signature schemes based on pairing.Available at:http://eprint.iacr.org, 2O02. 被引量:1
7K Paterson.ID-based signatures from pairing on elliptic curves. Available at : http ://epring.iaer.org, 2002. 被引量:1
8Fangguo Zhang,Kwangjo Kim.ID-Based Blind Signature and Ring Signature from Pairings[C].In :Yuliang Zheng eds.Proceedings of Advances in Cryptology-ASIACRYPT 2002,Queenstown,New Zealand, LNCS 2501 ,Springer-Vedag, 2002 : 533-547. 被引量:1
9Chih-Yin Lin,Tzong-Chen Wu.An Identity-based Ring Signature Scheme from Billnear Pairings[R].Cryptology ePrint Archive,Report 2003/117, Available at http ://eprint.iacr.org, 2003. 被引量:1
10Amit K Awasthi,Sunder Lal.ID-based Ring Signature and Proxy Ring Signature Schemes from Bilinear Pairings[R].Cryptology ePrint Archive,Report 2004/184,Available at http://epfint.iacr.org,2004. 被引量:1