KRAWCZYK H,RABIN T.Chameleon signatures[C]∥Proceedings of Network and Distributed System Security Symposium(NDSS 2000).San Diego:Internet Society,2000:143-154.
[2]
SHAMIR A.Identity-based cryptosystems and signature schemes[C]∥Advances in Cryptology(Crypto 84).California:Springer-Verlag,1984:47-53.
[3]
BONEHD,FRANKLINM.Identity-based encryption from the Weil pairing[C]∥Advances in Cryptology(Crypto 01).SantaBarbara:Springer-Verlag,2001:213-229.
[4]
CHEN Xiao-feng,ZHANG F,KIM K.New id-based group signature from pairings[J].Journal of Electronics,2006,23(6):892-900.
[5]
CHOW S.Removing escrowfrom identity-based encryption[C]∥The 12th International Conference on Practice and Theory inPublic-Key Cryptography(PKC 09).Irvine:Springer-Verlag,2009:256-276.
[6]
YUEN T,SUSILO W,MUYi.Howto Construct identity-based signatures without the key escrowproblem[EB/OL].[2010-03-01].http:∥eprint.iacr.org/2009/421.
[7]
ATENIESE G,MEDEIROS B.Identity-based chameleon hash and applications[C]∥Financial Cryptography and datasecurity(FC 04).Key West:Springer-Verlag,2004:164-180.
[8]
ATENIESE G,MEDEIROS B.On the key-exposure problem in chameleon hashes[C]∥The Fourth Conference on Securityin Communication Networks(SCN 04).Amalfi:Springer-Verlag,2004:165-179.