Citation: | ZHANG Yichen, LI Jiguo, WANG Zhiwei, et al., “A New Efficient Certificate-Based Signature Scheme,” Chinese Journal of Electronics, vol. 24, no. 4, pp. 776-782, 2015, doi: 10.1049/cje.2015.10.019 |
A. Shamir, "Identity-based cryptosystems and signature schemes", Proc. of CRYPTO 1984, LNCS, Springer, Heidelberg, Vol.196, pp.47-53, 1985.
|
S.S. Al-Riyami and K.G. Paterson, "Certificateless public key cryptography", Proc. of ASIACRYPT 2003, LNCS, Springer, Heidelberg, Vol.2894, pp.452-473, 2003.
|
X.Y. Huang, W. Susilo, Y. Mu, et al. "On the security of certificateless signature schemes from asiacrypt 2003", Proc. of CANS 2005, LNCS, Springer, Heidelberg, Vol.3810, pp.13-25, 2005.
|
J.G. Li, X.Y. Huang, Y. Mu, et al. "Cryptanalysis and improvement of an efficient certificateless signature scheme", Journal of Communications and Networks, Vol.10, No.1, pp.10-17, 2008.
|
C. Gentry, "Certificate-based encryption and the certificate revocation problem", Proc. of EUROCRYPT 2003, LNCS, Springer, Heidelberg, Vol.2656, pp.272-293, 2003.
|
B.G. Kang, J.H. Park and S.G. Hahn, "A Certificate-based signature scheme", Proc. of CT-RSA 2004, LNCS, Springer, Heidelberg, Vol.2964, pp.99-111, 2004.
|
J.G. Li, X.Y. Huang, Y. Mu, et al. "Certificate-based signature: Security model and efficient construction", Proc. of EuroPKI 2007, LNCS, Springer, Heidelberg, Vol.4582, pp.110-125, 2007.
|
J.G. Li, X.Y. Huang, Y. Mu, et al. "Constructions of certificatebased signature secure against key replacement attacks", Journal of Computer Security, Vol.18, No.3, pp.421-449, 2010.
|
W. Wu, Y. Mu, W. Susilo, et al. "Certificate-based signatures: New definitions and a generic construction from certificateless signatures", Proc. of WISA 2008, LNCS, Springer, Heidelberg, Vol.5379, pp.99-114, 2009.
|
J. Liu, J. Baek, W. Susilo, et al. "Certificate-based signature schemes without pairings or random oracles", Proc. of ISC 2008, LNCS, Springer, Heidelberg, Vol.5222, pp.285-297, 2008.
|
J.H. Zhang, "On the security of a certificate-based signature scheme and its improvement with pairings", Proc. of ISPEC 2009, LNCS, Springer, Heidelberg, Vol.5451, pp.47-58, 2009.
|
Y. Ming and Y. Wang, "Efficient certificate-based signature scheme", Proc. of IAS 2009, IEEE, Vol.2, pp.87-90, 2009.
|
J. Zhang, H. Chen and Q. Geng, "An efficient certificatebased signature scheme without pairings", Proc. of WCSE 2009, IEEE, Vol.2, pp.44-48, 2009.
|
J.G. Li, Z.W. Wang and Y.C. Zhang, "Provably secure certificate-based signature scheme without pairings", Information Sciences, Vol.233, No.6, pp.313-320, 2013.
|
M.H. Au, J.K. Liu, W. Susilo,et al. "Certificate based (linkable) ring signature", Proc. of ISPEC 2007, LNCS, Springer, Heidelberg, Vol.4464, pp.79-92, 2007.
|
L.H. Wang, J.Shao, Z.F. Cao,et al. "A certificate-based proxy cryptosystem with revocable proxy decryption power", Proc. of INDOCRYPT 2007, LNCS, Springer, Heidelberg, Vol.4859, pp.297-311, 2007.
|
J.G. Li, L.Z. Xu and Y.C. Zhang, "Provably secure certificatebased proxy signature schemes", Journal of Computers, Vol.4, No.6, pp.444-452, 2009.
|
J.G. Li, X.Y. Huang, Y.C. Zhang, et al. "An efficient short certificate-based signature scheme", Journal of Systems and Software, Vol.85, No.2, pp.314-322, 2012.
|
J.G. Li, Y.C. Zhang and H.Y. Teng, "A forward-secure certificate-based signature scheme in the standard model", Proc. of CSS 2012, LNCS, Springer, Heidelberg, Vol.7672, pp.362- 376, 2012.
|
D. Pointcheval and J. Stern, "Security arguments for digital signatures and blind signatures", Journal of Cryptology, Vol.13, No.3, pp.361-396, 2000.
|
A.D. Caro, "Java pairing-based cryptography library", available at http://gas.dia.unisa.it/projects/jpbc, 2013-12-4.
|
B. Lynn, "Pairing-based cryptography (PBC) library", available at http://crypto.stanford.edu/pbc, 2013-6-14.
|
Q.H. Yu, J.G. Li, Y.C. Zhang, et al. "Certificate-based encryption resilient to key leakage", Journal of Systems and Software, DOI: 10.1016/j.jss.2015.05.066, 2015-5-8.
|
Q.H. Yu, J.G. Li and Y.C. Zhang, "Leakage-resilient certificatebased encryption", Security and Communication Networks, DOI:10.1002/sec.1258, 2015-6-16
|