5Ellison C,Schneier B. Ten risks of PKI: What you are not being told about Public Key Infrastructure. Computer Security Journal, 2000, ⅩⅦ(1)
6Boneh D, Lynn B, Shacham H. Aggregate and verifiably encrypt ed signatures from bilinear maps. In:E. Biham,ed. Proc. of Eurocrypt 2003, volume 2656 of LNCS, Springer-Verlag, 2003. 416 ~ 432
7Boldyreva A. Efficient threshold signature, multisignature and blind signature schemes based on the gap-Diffie-Hellman-group signature. In: Y. Desmedt, ed. Proc. of PKC 2003, volume 2567 of LNCS, Springer-Verlag, 2003. 31~46
8Boneh D, Gentry C, Lynn B,Shacham H. A survey of Two Signa ture Aggregation Techinques. RSA Laboratories, 2003,6 ( 2 )
9Joux A, Nguyen K. Separating decision Diffie-Hellman from Diffie-Hellman in Cryptographic groups. Cryptology ePring Archive:[Report 2001/003]. 2001. http:∥eprint. iacr. org/.
10Jakobsson M, Mraihi D, Tsiounis Y, Yung M. Electronic Payments:Where Do We Go From Here.? In: R. Baumgart, ed. LNCS 1740. Springer-Verlag, 1999. 43~63
7Ellison C,Schneier B. Ten risks of PKI: What you are not being told about Public Key Infrastructure. Computer Security Journal, 2000, ⅩⅦ(1)
8Boneh D, Lynn B, Shacham H. Aggregate and verifiably encrypt ed signatures from bilinear maps. In:E. Biham,ed. Proc. of Eurocrypt 2003, volume 2656 of LNCS, Springer-Verlag, 2003. 416 ~ 432
9Boldyreva A. Efficient threshold signature, multisignature and blind signature schemes based on the gap-Diffie-Hellman-group signature. In: Y. Desmedt, ed. Proc. of PKC 2003, volume 2567 of LNCS, Springer-Verlag, 2003. 31~46
10Boneh D, Gentry C, Lynn B,Shacham H. A survey of Two Signa ture Aggregation Techinques. RSA Laboratories, 2003,6 ( 2 )