[1] Shamir A. Identity-based cryptosystems and signature schemes//Crypto’84. Berlin: Springer-Verlag, 1984: 47-53.<br>[2] Boneh D, Franklin M K. Identity-based encryption from the Weil pairing//Crypto’01. Berlin: Springer-Verlag, 2001: 213-229.<br>[3] Paterson K G. ID-based signatures from pairings on elliptic curves[J]. IEEE Commun Letters, 2002, 38(18): 1025-1026.<br>[4] Hess F. Efficient identity based signature schemes based on pairings//SAC’02. Berlin: Springer-Verlag, 2002: 310-324.<br>[5] Cha J C, Cheon J H. An identity-based signature from gap Diffie-Hellman groups//PKC’03. Berlin: Springer-Verlag, 2003: 18-30.<br>[6] Barreto P S L M, Libert B, McCullagh N, et al. Efficient and provably-secure identity-based signatures and signcryption from bilinear maps//Asiacrypt’05. Berlin: Springer-Verlag, 2005: 515-532.<br>[7] 崔巍, 辛阳, 胡程瑜, 等. 高效的基于身份的(受限)部分盲签名[J]. 北京邮电大学学报, 2008, 31(4): 53-57. Cui Wei, Xin Yang, Hu Chengyu, et al. Efficient ID-based (restrictive) partially blind signature[J]. Journal of Beijing University of Posts and Telecommunications, 2008, 31(4): 53-57.<br>[8] Paterson K G, Schuldt J C N. Efficient identity-based signatures secure in the standard model//ACISP’06. Berlin: Springer-Verlag, 2006: 207-222.<br>[9] 冯登国. 可证明安全性理论与方法研究[J]. 软件学报, 2005, 16(10): 1743-1756. Feng Dengguo. Research on theory and approach of provable security[J]. Journal of Software, 2005, 16(10): 1743-1756.<br>[10] Libert B, Quisquater J J. The exact security of an identity based signature and its applications. (2004). Http://eprint.iacr.org.<br>[11] Coron J S. On the exact security of full domain hash//Crypto’00. Berlin: Springer-Verlag, 2000: 229-235.<br>[12] Katz J, Wang N. Efficiency improvements for signature schemes with tight security reductions//ACMCCS’03. : ACM Press, 2003: 155-164.<br>[13] Waters B. Efficient identity-based encryption without random oracles//Eurocrypt’05. Berlin: Springer-Verlag, 2005: 114-127.<br>[14] Gentry C. Practical identity-based encryption without random oracles//Eurocrypt’06. Berlin: Springer-Verlag, 2006: 445-464.<br>[15] 明洋,王育民. 有效的无证书签名方案[J]. 电子科技大学学报, 2008, 37(2): 175-177. Ming Yang, Wang Yumin. Efficient certificateless signature scheme based on bilinear pairings[J]. Journal of University of Electronic Science and Technology of China, 2008, 37(2): 175-177.<br>[16] Bao Feng, Deng R, Zhu Huafei. Variations of Diffie-Hellman problem//ICICS’03. Berlin: Springer-Verlag, 2003: 301-312. |