共 11 条
[4]
Practical Identity-Based Aggregate Signature from Bilinear Maps[J]. 王竹,吴倩,叶顶锋,陈辉焱. Journal of Shanghai Jiaotong University(Science). 2008(06)
[5]
A new certificateless aggregate signature scheme
[J].
COMPUTER COMMUNICATIONS,
2009, 32 (06)
:1079-1085
[6]
An aggregate signature scheme with constantpairing operations. WEN Y L,MA J F. Proceedings of 2008 International Confer-ence on Computer Science and Software Engineering . 2008
[7]
Cryptanalysis of Li et al.’’s identity-based threshold signcryption scheme. SELVI S S D,VIVEK S S,RANGAN C P,et al. Pro-ceedings of2008IEEE/IFIP International Conference on Embedded and Ubiquitous Computing . 2008
[8]
New directions in cryptography. Diffie W, Hellman ME. IEEE Transactions on Information Theory . 1976
[9]
Provably secure aggregate sign-cryption schemes. REN X Y,ZHENG H Q,GENG Y. ETRI Journal . 2012
[10]
Security analysis ofaggregate signature and batch verification signature schemes. SELVI S S D,VIVEK S S,SHRIRAM J,et al. http://eprint.iacr.org/2009/290.pdf . 2012