Maji H,Prabhakaran M,Rosulek M.Attribute-based signatures:Achieving attribute-privacy and collusion-resistance .http://www.iacr.org/cryptodb/data/paper.php,2008-03-28.
[3]
Shaniqng G,Yingpei Z.Attribute-based signature scheme .International Conference on Information Security and Assurance,ISA 2008 .USA:IEEE,2008.509-511.
[4]
Li J,Kim K.Attribute-based ring signatures .http://eprint.iacr.org/2008/394.html,2011-12-20.
[5]
Chaum D,Van Heyst E.Group signatures .Advances in Cryptology-EUROCRYPT’91 .Berlin:Springer ,1991.257-265.
[6]
Khader D.Attribute based group signature with revocation .http://eprint.iaer.org/2007/241.html,2009-03-12.
[7]
Shahandashti S,Safavi-Naini R.Threshold attribute-based signatures and their application to anonymous credential systems .Progress in Cryptology-AFRICACRYPT 2009 .Berlin:Springer,2009.198-216.
[8]
Yang P,Cao Z,Dong X.Fuzzy identity based signature .http://eprint.iacr.org/2008/002.pdf,2008-01-01.
[9]
Rivest R,Shamir A,Tauman Y.How to leak a secret .Advances in Cryptology-ASIACRYPT 2001 .Berlin:Springer,2001.552-565.
[10]
Li J,Au M H,Susilo W,Xie D,Ren K.Attribute-based signature and its applications .ASIACCS’10 Proceedings of the 5th ACM Symposium on Information,Computer and Communications Security .New York:ACM,2010.60-69.
[11]
庞辽军,焦李成.无可信中心的可变门限签名方案[J].电子学报,2008,36(8):1559-1563. Pang Liaojun,Jiao Licheng.Changeablethreshold signature scheme without a trusted cente[J].Acta Electronica Sinica,2008,36(8):1559-1563.(in chinese)