1A. Sharrfir. Identity-based Cryptosystems and Signature Schemes [M]. Advances in Cryptology-Crypto'84, LNCS 196, Berlin: Springer-Verlag, 1985:47-53.
2S. A1-Riyami, K. Paterson. Certificateless public key cryptography [M]. ASIACRYPT 2003, LNCS 2894, Berlin: Springer-Verlag, 2003:452-473.
3X. Huang, Y. Mu, W. Susilo, D. Wong, and W. Wu. Certificateless signature revisited[M]. ACISP 2007, LNCS 4586, Berlin: Springer-Verlag, 2007:308-322.
4H. Du, Q.Wen, Efficient and provably-secure certificateless short signature scheme from bilinear pairings [J]. Computer Standards and Interfaces, 2009,31 (2): 390-394.
5L. Zhang, F. Zhang, A new provably secure certificateless signature scheme. ICC 2008, IEEECommunications Society.
6B. Hu,D. Wong,Z. Zhang,et al.Certificateless signature: new security model and an improved generic construction[J]. Design, Codes and Cryptography,2007,42:109-126.
8A. Ge,S. Chen,X. Y. Huang. A concrete certificateless signature scheme without pairings. The 2009 International Conference on Multimedia Information Networking and Security [J]. IEEE Computer Society, 2009(2):374-377.
9J. Zhang,J. Mao. An efficient P, SA-based certificateless signature scheme[J]. The Journal of Systems and Software (2011), 2011 (09):36.
10X. Cao,W. Kou,X. Du. A pairing-flee identity-based authenticated key agreement protocol with minimal message exchanges [J].Information Sciences, 2010,180 (15) : 2895-2903.
同被引文献10
1胡光永.基于云计算的数据安全存储策略研究[J].计算机测量控制,2011(10).
2Dutta R,Barua R,Sarkar P. Provably secure authenticatedtree based group key agreement[A].2004.27-29.