1. Gu Li-ze, Zhang Sheng, Yang Yi-xian. An improved proxy multi-signature scheme. The Journal of China Universities of Posts and Telecommunications, 2005, 12(1): 10-14
2. Jia Xiao-yun, Luo Shou-shan, Yuan Chao-wei. A new signature scheme with shared verification. The Journal of China Universities of Posts and Telecommunications, 2006, 13(2): 66-69
3. Shamir A. Identity based cryptosystems and signature scheme. Proceedings of CRYPTO 1984(LNCS 196), Aug 19-22, 1984, Santa Barbara, CA, USA. Berlin, Germany, Springer-Verlag, 1984: 47-53
4. Al-Riyami S S, Paterson K G. Certificateless public key cryptography. Proceedings of CRYPTO 2003 (LNCS 2894),Nov 30-Dec 4, 2003, Taipei, China. Berlin, Germany: Springer-Verlag, 2003: 452-473
5. Al-Riyami S S, Paterson K G. CBE from CL-PKE: a generic construction and efficient schemes. Proceedings of PKC 2005 (LNCS 3386), Jan 23-26, 2005, Les Diablerets, Switzerland. Berlin, Germany: Springer-Verlag, 2005: 398-415
6. Baek J, Safavi-Nani R, Susilo W. Certificateless public key encryption without pairing. Proceedings of ISC 2005 (LNCS 3650), Sep 20-23, 2005, Singapore, Berlin, Germany: Springer-Verlag, 2005: 134-148
7. Shi Y, Li J. Provable efficient certificateless public key encryption. Cryptology eprint Archive, Report 2005/287. http://eprint.iacr.org/2005/287
8. Huang X, Susilo W, Mu Y, et al. On the security of certificateless signature schemes from asiacryp to 2003. Proceedings of CANS 2005 (LNCS 3810), Dec 14-16, 2005, Xiamen, China. Berlin, Germany: Springer-Verlag, 2005: 13-25
9. Li X, Chen K, Sun L. Certificateless signature and proxy signature schemes from bilinear pairings. Lithuanian Mathematical Journal, 2005, 45(1): 76-83
10. Boneh D, Ding X, Tsudik G, et al. A method for fast revocation of public key certificates and security capabilities. Proceedings of the 10th USENIX Security Aymposium, Jun 25-30, 2001, Boson, MA, USA. Washington DC, USA: USENIX Association, 2001: 297-308
11. Ju H S, Kim D Y, Lee D H, et al. Efficient revocation of security capability in certificateless public key cryptography. Proceedings of KES 2005 (LNAI 3682), Sep 14-16, 2005, Melbourne, Australia. Berlin, Germany: Springer-Verlag, 2005: 453-459
12. Mu Y, Susilo W, Lin Y X, et al. Identity-based authentication broadcast encryption and distributed authenticated encryption. Proceedings of ASIAN 2004 (LNCS 3321), May 12-16, 1996, Saragossa, Spain. Berlin, Germany: Springer-Verlag, 2004: 169-181
13. Pointcheval D, Stern J. Security proofs for signature schemes. Proc. of EUROCRYPTO 1984, LNCS 1070, Berlin: Springer- Verlag, 1984: 387-398 |