[1] |
RIVEST R L, SHAMIR A, TAUMAN Y. How to Leak a Secret[C]//Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security. Heidelberg:Springer, 2001:552-565.
|
[2] |
LIU J K, WEI V K, WONG D S. Linkable Spontaneous Anonymous Group Signature for Ad Hoc Groups[C]//Proceedings of 9th Australasian Conference on Information Security and Privacy. Heidelberg:Springer, 2004:325-335.
|
[3] |
FUJISAKI E, SUZUKI K. Traceable Ring Signature[C]//Proceedings of the 10th International Workshop on Public Key Cryptography. Heidelberg:Springer, 2007:181-200.
|
[4] |
TEAGUE V. Which E-Voting Problems Do We Need to Solve?[C]//Proceedings of the 41st Annual International Cryptology Conference. Heidelberg:Springer, 2021:3-7.
|
[5] |
李雪莲, 张夏川, 高军涛, 等. 支持属性和代理重加密的区块链数据共享方案[J]. 西安电子科技大学学报, 2022, 49(1):1-16.
|
|
LI Xuelian, ZHANG Xiachuan, GAO Juntao, et al. Blockchain Data Sharing Scheme Supporting Attribute and Proxy Re-Encryption[J]. Journal of Xidian University, 2022, 49(1):1-16.
|
[6] |
杜瑞忠, 王一, 田俊峰. 一种支持动态可验证的密文检索方案[J]. 西安电子科技大学学报, 2022, 49(1):35-46.
|
|
DU Ruizhong, WANG Yi, TIAN Junfeng. Support Dynamic and Verifiable Scheme for Ciphertext Retrieval[J]. Journal of Xidian University, 2022, 49(1):35-46.
|
[7] |
FUJISAKI E. Sub-linear Size Traceable Ring Signatures without Random Oracles[C]//Proceedings of the CT-RSA. Heidelberg:Springer, 2011:393-415.
|
[8] |
AU M H, LIU J K, SUSILO W et al. Secure ID-based Linkable and Revocable-iff-linked Ring Signature with Constant-size Construction[J]. Theoretical Computer Science, 2013, 469:1-14.
doi: 10.1016/j.tcs.2012.10.031
|
[9] |
汤永利, 夏菲菲, 叶青, 等. 格上基于身份的可链接环签名[J]. 密码学报, 2020, 8(2):232-247.
|
|
TANG Yongli, XIA Feifei, YE Qing et al. Identity-Based Linkable Ring Signature on Lattice[J]. Journal of Cryptologic Research, 2020, 8(2):232-247.
|
[10] |
TANG Y L, XIA F F, YE Q, et al. Identity-Based Linkable Ring Signature on NTRU Lattice[J/OL].[2022-07-12]. DOI:10.1155/2021/9992414.
doi: 10.1155/2021/9992414
|
[11] |
LE H Q, VO B, DUONG D H, et al. Identity-Based Linkable Ring Signatures from Lattices[J]. IEEE Access, 2021, 9(9):84739-84755.
doi: 10.1109/ACCESS.2021.3087808
|
[12] |
BAUM C, LIN H, OECHSNER S. Towards Practical Lattice-Based One-Time Linkable Ring Signatures[C]//Proceedings of the 20th International Conference on Information and Communications Security. Heidelberg:Springer, 2018:303-322.
|
[13] |
FENG H W, LIU J W, LI Y N, et al. Traceable Ring Signatures:General Framework and Post-quantum Security[J]. Designs,Codes and Cryptography, 2021, 89(6):1111-1145.
doi: 10.1007/s10623-021-00863-x
|
[14] |
GENTRY C, PEIKERT C, VAIKUNTANATHAN V. Trapdoors for Hard Lattices and New Cryptographic Constructions[C]// Proceedings of the 40thAnnual ACM Symposium on Theory of Computing. New York: ACM, 2008:197-206.
|
[15] |
LYUBASHEVSKY V. Lattice Signatures without Trapdoors[C]//Proceedings of the 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques. Heidelberg:Springer, 2012:738-755.
|
[16] |
POINTCHEVAL D, STERN J. SecurityArguments for Digital Signatures and Blind Signatures[J]. Journal of Cryptology, 2000, 13:361-396.
doi: 10.1007/s001450010003
|