Yu J,Kong F Y,Cheng X G,Hao R,et al.Intrusion-resilient identity-based signature:security definition and construction[J].Journal of Systems and Software,2012,85(2):382-391.
[2]
Hanaoka G,Hanaoka Y,Imai H.Parallel key-insulated public key encryption[A].Proceedings of Public Key Cryptography-PKC 2006[C].Berlin:Springer,2006.105-122.
[3]
Weng J,Chen K F,et al.Parallel key-insulated signature framework and construction[J].Journal of Shanghai Jiaotong University,2008,13(1):6-11.
[4]
Wan Z M,Lai X J,et al.Strong key-insulated signature in the standard model[J].Journal of Shanghai Jiaotong University,2010,15(6):657-661.
Boneh D,Gentry C,Lynn B,Shacham H.Aggregate and verifiably encrypted signatures from bilinear maps[A].Proceedings of Cryptology-Eurocrypt''03[C].Berlin:Springer,2003.416-432.
[7]
Lu S,Ostrovsky R,Sahai A,Shacham H,et al.Sequential aggregate signatures and multi signatures without random oracles[A].Proceedings of Cryptology-Eurocrypt''06[C].Berlin:Springer,2006.456-485.
[8]
Brogle K,Goldberg Sh,Reyzin L.Sequential aggregate signatures with lazy verification from trapdoor permutations[A].Proceedings of the 18th international conference on The Theory and Application of Cryptology and Information Security[C].Berlin:Springer,2012.644-662.
[9]
杜红珍,黄梅娟,温巧燕.高效的可证明安全的无证书聚合签名方案[J].电子学报,2013,41(1):72-76. Du H Z,Huang M J,Wen Q Y.Efficient and provably-secure certificateless aggregate signature scheme[J].Acta Electronica Sinica,2013,41(1):72-76.(in Chinese)
[10]
Lu S,Ostrovsky R,Sahai A,Shacham H,et al.Sequential aggregate signatures,multisignatures,and verifiably encrypted signatures without random oracles[J].Journal of Cryptology,2013,26(2):340-373.
[11]
Ma D.Practical forward secure sequential aggregate signatures[A].Proceedings of the 2008 ACM Symposium on Information,Computer and Communications Security[C].New York:ACM,2008.341-352.
[12]
Bellare M,Miner S.A forward-secure digital signature scheme[A].Proceedings of the CRYPTO 1999[C].1999.431-448.
[13]
Yu J,Kong F Y,Cheng X G,et al.One forward-secure signature scheme using bilinear maps and its applications[J].Information Sciences,2014,279:60-76.
[14]
Yu J,Hao R,Kong F Y,Cheng X G,et al.Forward-secure identity-based signature:security notions and construction[J].Information Sciences,2011,181(3):648-660.
[15]
Dodis Y,Katz J,Xu S,et al.Strong key-insulated signature schemes[A].Proceedings of the 6th Int Workshop on Practice and Theory in Public Key Cryptography[C].Berlin:Springer,2003,130-144.
[16]
葛立荣,于佳,程相国,等.标准模型下支持多协助器的强密钥隔离签名方案[J].计算机研究与发展.2014,51(5):1081-1088. Ge L R,Yu J,Cheng X G,et al.Strong key-insulated signature scheme supporting multi-helpers in the standard model[J].Journal of Computer Research and Development,2014,51(5):1081-1088.(in Chinese)