[1] CHAUM D,HEYST V E. Group signatures[C]//Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques, 1991: 257-265.
[2] 程小刚, 王箭, 杜吉祥. 群签名综述[J]. 计算机应用研究, 2013, 30(10): 2881-2886.
CHENG X G, WANG J, DU J X. Survey on group signature[J]. Application Research of Computers, 2013, 30(10): 2881-2886.
[3] KHADER D. Attribute based group signatures[EB/OL]. (2007-01-12)[2024-09-06]. https://eprint.iacr.org/2007/159.
[4] SAHAI A, WATERS B. Fuzzy identity-based encryption[C]//Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2005: 457-473.
[5] KHADER D. Attribute based group signature with revocation[EB/OL]. Cryptology ePrint Archive (2007-06-19) [2024-09-06]. https://eprint.iacr.org/2007/241.
[6] EMURA K, MIYAJI A, OMOTE K. A dynamic attribute-based group signature scheme and its application in an anonymous survey for the collection of attribute statistics[C]//Proceedings of the International Conference on Availability, Reliability and Security. Piscataway: IEEE, 2009: 487-492.
[7] ALI S T, AMBERKER B B. Dynamic attribute based group signature with attribute anonymity and tracing in the standard model[C]//Proceedings of the International Conference on Security, Privacy, and Applied Cryptography Engineering,2013: 147-171.
[8] 许玉岚, 陈燕俐, 高诗尧. 支持LSSS访问结构的属性基群签名方案的研究[J]. 计算机技术与发展, 2021, 31(9): 92-98.
XU Y L, CHEN Y L, GAO S Y. Research on attribute-based group signature scheme supporting LSSS access structure[J]. Computer Technology and Development, 2021, 31(9): 92-98.
[9] WEI J H, HUANG X Y, LIU W F, et al. Practical attribute-based signature: traceability and revocability[J]. The Computer Journal, 2016, 59(11): 1714-1734.
[10] SU Q Q, ZHANG R, XUE R, et al. Distributed attribute-based signature with attribute dynamic update for smart grid[J].IEEE Transactions on Industrial Informatics, 2023, 19(9): 9424-9435.
[11] CHENG X G, WANG J, DU J X. A new revocation method for standard model group signature[J]. Journal of Computers, 2014, 9(5): 1053-1057.
[12] PEDERSEN T P, PFITZMANN B. Fail-stop signatures[J]. SIAM Journal on Computing, 1997, 26(2): 291-330.
[13] CHEN J J, CHIANG Y Y, HSU W H, et al. Fail-stop group signature scheme[J].Security and Communication Networks, 2021: 6693726.
[14] SHAMIR A. How to share a secret[J]. Communications of the ACM, 1979, 22(11): 612-613.
[15] BONEH D, BOYEN X. Short signatures without random oracles and the SDH assumption in bilinear groups[J]. Journal of Cryptology, 2008, 21(2): 149-177.
[16] BONEH D, BOYEN X, SHACHAM H. Short group signatures[C]//Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2004: 41-55.
[17] DE CARO A, IOVINO V. JPBC: Java pairing based cryptography[C]//Proceedings of the IEEE Symposium on Computers and Communications. Piscataway: IEEE, 2011: 850-855.
[18] LI B H, HUANG Y Y, ZHAO Y L. Fully adaptive attribute-based group signature in standard model[J]. Journal of the Chinese Institute of Engineers, 2015, 38(2): 200-207.
[19] BLAZY O, FUCHSBAUER G, IZABACHèNE M, et al. Batch groth-Sahai[C]//Proceedings of the 8th International Conference on Applied Cryptography and Network Security, 2010: 218-235. |