Citation: | ZHAI Jiaqi, LIU Jian, CHEN Lusheng, “Extraction Security of Sequential Aggregate Signatures,” Chinese Journal of Electronics, vol. 30, no. 5, pp. 885-894, 2021, doi: 10.1049/cje.2021.06.011 |
D. Boneh, C. Gentry, B. Lynn, et al., "Aggregate and verifiably encrypted signatures from bilinear maps", Advances in Cryptology-CRYPTO'03, Lecture Notes in Computer Science, Vol.2656, pp.416-432, 2003.
|
S. Kent, C. Lynn and K. Seo, "Secure border gateway protocol (S-BGP)", IEEE Journal on Selected Areas in Communications, Vol.18, No.4, pp.582-592, 2000.
|
W.F. Zhang, L.T. Lei, X.M. Wang, et al., "Secure and efficient authentication and key agreement protocol using certificateless aggregate signature for cloud service oriented VANET", Acta Electronica Sinica, Vol.48, No.9, pp.1814-1823, 2020.
|
Y. Xu, L.S. Huang, M.M. Tian, et al., "A provably secure and compact certificateless aggregate signature scheme", In:Acta Electronica Sinica, Vol.44, No.8, pp.1845-1850, 2016.
|
J. H. Ahn, M. Green and S. Hohenberger, "Synchronized aggregate signatures:New definitions, constructions and applications", Proceedings of the 17th ACM Conference on Computer and Communications Security, pp.473-484, 2010.
|
M. Bellare, C. Namprempre and G. Neven, "Unrestricted aggregate signatures", ICALP'07, Lecture Notes in Computer Science, Vol.2656, pp.411-422, 2007.
|
C. Gentry, A. O'Neill and L. Reyzin, "A unified framework for trapdoor-permutation-based sequential aggregate signatures", PKC'18, Lecture Notes in Computer Science, Vol.10770, pp.34-57, 2018.
|
C. Gentry and Z. Ramzan, "Identity-based aggregate signatures", PKC'06, Lecture Notes in Computer Science, Vol.3958, pp.257-273, 2006.
|
S. Hohenberger and B. Waters, "Synchronized aggregate signatures from the RSA assumption", Advances in Cryptology-EUROCRYPT'18, Lecture Notes in Computer Science, Vol.10821, pp.197-229, 2018.
|
A. Lysyanskaya, S. Micali, L. Reyzin, et al., "Sequential aggregate signatures from trapdoor permutations", Advances in Cryptology-CRYPTO'04, Lecture Notes in Computer Science, Vol.3027, pp.74-90, 2004.
|
S. Lu, R. Ostrovsky, A. Sahai, H. Shacham, et al., "Sequential aggregate signatures and multisignatures without random oracles", Advances in Cryptology-CRYPTO'06, Lecture Notes in Computer Science, Vol.4004, pp.465-485, 2006.
|
G. Neven, "Efficient sequential aggregate signed data", Advances in Cryptology-EUROCRYPT'08, Lecture Notes in Computer Science, Vol.4965, pp.52-69, 2008.
|
B. Waters, "Efficient identity-based encryption without random oracles", Advances in Cryptology-EUROCRYPT'05, Lecture Notes in Computer Science, Vol.3494, pp.114-127, 2005.
|
M. Bellare, C. Namprempre and G. Neven, "Security proofs for identity-based identification and signature schemes", Advances in Cryptology-EUROCRYPT'04, Lecture Notes in Computer Science, Vol.3027, pp.268-286, 2004.
|
D. Boneh, B. Lynn and H. Shacham, "Short signatures from the Weil pairing", Advances in Cryptology-ASIACRYPT'01, Lecture Notes in Computer Science, Vol.2248, pp.514-532, 2001.
|
C. Gentry and A. Silverberg, "Hierarchical ID-based cryptography", Advances in Cryptology-ASIACRYPT'02, Lecture Notes in Computer Science, Vol.2501, pp.548-566, 2002.
|