[1]Nyberg K,Rueppel R A.Message Recovery for Signature Schemes Based on the Discrete Logarithm Problem[J].Designs,Codes and Cryptography,1996(7):61-81.
[2]Diffie W,Hellmann M.New Direction in Cryptography[J].IEEE Trans on Information Theory,1976,22(6):644-654.
[3]Xin Xiangjun,Li Fagen,Xiao Guozhen.A Fair Exchange Protocol Based on Short Signature with the Off-line Semitrusted Third Party[J].Journal of Xidian University,2007,34(1):92-95.
[4]Wu Qianhong,Zhu Xiaoyan,Wang Yumin.A Practical Electronic Auction Scheme Based on the RSA Function[J].Journal of Xidian University,2003,30(6):788-791.
[5]Rivest R L,Shamir A,Adelman L.A Method for Obtain Digital Signatures and Public-Key Cryptosystem[C].Commun ACM,1978,21(2):120-126.
[6]Rabin M V.Digitalized Signature and Public Key Functions as Intractables as Factorization[R].USA:Technical Report,MIT/LCS/TR212,MIT Lab,1979.
[7]Ohta K,Okamato T,Koyama K.Membership Authentication for Hierarchical Multigroup Using the Extended Fiat-Shamir Scheme[C].Germa:Advanced in the Cryptology-Eurocrypt90,Lecture Notes of Computer Science 473,Springer-Verlag,1990:446-457. |