[1] Al-Riyami S S, Paterson K G.Certificateless public key cryptography[C]// Proc of ASIACRYPT 2003. 2003:452-473.
[2] Boneh D, Gentry C, Lynn B, et al. Aggregate and verifiably encrypted signatures from bilinear maps[C]// Proc of the 22nd International Conference on Theory and Applications of Cryptographic Techniques. 2003:416-432.
[3] Zhang Lei, Zhang Fu-tai. A new certificateless aggregate signature scheme[J]. Computer Communications, 2009,32(6):1079-1085.
[4] Zhang Lei, Qin Bo, Wu Qian-hong, et al. Efficient many-to-one authentication with certificateless aggregate signatures[J]. Computer Networks, 2010,54(14):2482-2491.
[5] Xiong Hu, Guan Zhi, Chen Zhong, et al. An efficient certificateless aggregate signature with constant pairing computations[J]. Information Science, 2013,219(10):225-235.
[6] Shen Limin, Sun Yinxia. On the security of a certificateless aggregate signature scheme[J]. International Journal of Advancements in Computing Technology, 2013,5(3):358-367.
[7] 杜红珍,黄梅娟,温巧燕,等. 高效的可证明安全的无证书聚合签名方案[J]. 电子学报, 2013,41(1):73-76.
[8] 喻琇瑛,何大可. 一个新的无证书聚合签名[J]. 计算机应用研究, 2014,31(8):2485-2487.
[9] 孙华,郭磊,郑雪峰,等. 一种有效可证安全的基于身份代理聚合签名方案[J]. 计算机科学, 2012.39(1):44-47.
[10]侯红霞,张雪锋,董晓丽,等. 改进的无证书聚合签名方案[J]. 山东大学学报(理学版), 2013.48(9):29-34.
[11] Huang Xinyi, Mu Yi, Susilo W, et al. Certificateless signature revisited[C]// Proc. of ACISP 2007. 2007:308-322.
[12]Zhang Guoyan, Wang Shaohui. A certificateless signature and group signature schemes against malicious PKG[C]// Proceedings of the 22nd IEEE Int Conf on Advanced Information Networking and Applications. 2008:334-341.
[13]Hu B, Wong D, Zhang Z, et al. Key replacement attack against a generic construction of certificateless signature[C]// Proceedings of the ACISP 2006. 2006:235-346.
[14]Zhang Lei, Zhang Futai, Zhang Fangguo. New efficient certificateless signature scheme[C]// Proceedings of the EUC Workshops 2007. 2007:692-703.
[15]张磊,张福泰. 一类无证书签名方案的构造方法[J]. 计算机学报, 2009,32(5):940-945. |