D Chaum,E van Heyst.Group signatotes[A].Proc of EUROCRYPT''91[C].Berlin:Springer-Verlag,1991.547:257-265.
[2]
K G Paterson.ID-based signatures from pairings on elliptic curves[J].United Kingdom:IEE Electronics Letters,2002,38(18):1025-1026.
[3]
Chen Xiaofeng,Zhang Fangguo,Kwangjo Kim.New ID-based group signature from pairings[J].China:Journal of Electronics(China),2006,11,23(6):892-900.
[4]
Castelluccia C.How to convert any ID-based signature scheme into a group signature scheme[OL],http://eprint,iacr.org/,2002/116.
[5]
李敏,王尚平,马晓静,秦慧.分级群签名[J].计算机应用研究,2006,(9):88-91.Li Min,Wang Shang-ping,Ma Xiao-jing,Qin Hui.Rank group signature[J].Chengdu:Application Research of Compute,2006,(9):88-91.(in Chinese)
[6]
R Anderson.Invited lecture[R].The 4th ACM Conf on Computer and Communications Security,Zurich,1997.
[7]
SHAMIR A.Identity-based cryptosystems and signature schemes[A].Advances in Cryptology 1985[C].Berlin:Springer-Verlag,1985.196:47-53.
[8]
D Boneh,M Franklin.Identity based encryption from the weil pairing[A].Advances in Cryptology-Crypto of 2001[C].Berlin:Springer-Verlag,2001.2139:213-229.
[9]
Popescu C.An efficient ID-based group signature scheme[J].Studia Univ:Bahes-Bolyai,Informatica,2002,Volume XLVⅡ(2):29-36.
[10]
张培清,胡磊.一种基于身份的群签名方案[J].成都:计算机应用研究,2007,24(5):122-124.Zhang Pei-qing,Hu Lei.ID-based group signature scheme[J].Chengdu:Application Research of Computers,2007,24(5):122-124.(in Chinese)
[11]
Mihir Bellare,Phillip Rogaway.Minimizing the use of random oracles in authenticated encryption schemes[A].Information and Communications Security[C].Berlin:Springer-Verlag,1997.1334:1-16.
[12]
吴克力,孙抗毒,朱保平,刘凤玉.一种动态群签名方案[J].计算机应用与软件,2007,24(9):26-29.Wu Ke-li,San Kaug-du,Zhu Bao-ping,Liu Feng-yu.A dynamic group signature scheme[J].Shanghai:Computer Applications and Software,2007,24(9):26-29.(in Chinese)
[13]
Jian Weng,Shengli Liu,Kefei Chen,Changshe Ma.Identitybased key-insulated signature without random oracles[A].Computational Intelligence and Security[C].Berlin:Springer Verlag,2007,4456:470-480.