参考文献/References:
[1]Zheng Y.Digital signcryption or how to achieve cost (signature & encryption) cost (signature)+ cost (encryption)[M]//Advances in Cryptology- CRYPTO’97.Berlin:Springer-Verlag,1997:165-179.
[2] Zheng Y.Signcryption and its applications in efficient public key solutions[M]//Information Security.Berlin:Springer-Verlag,1998:291-312.
[3] Baek J,Steinfeld R,Zheng Y.Formal proofs for the security of signcryption[C]//PKC 2002.Berlin:Springer-Verlag,2002:80- 98.
[4] Chaum D,Heyst V E.Group Signatures[C]//Proceedings of Eurcrypt′91.Berlin:Springer-Verlag,1991:257-265.
[5] Camenisch J,Stadler M.Efficient group signature schemes for large groups[M]//Advances in Cryptology-Crypto′97.Berlin:Springer-Verlag,1997:410-424.
[6] Rivest R L,Shamir A,Tauman Y.How to leak a secret [A].Proc of Asiacrypt′01[C].Berlin:Springer- Verlag,2001:552-565.
[7] Abe M,Ohkubo M,Suzuki K.1-out-of-n signatures from a variety of keys[A].Proc of Asiacrypt′02 [C].Berlin:Springer- Verlag,2002:415 - 423.
[8] 王继林,毛剑,王育民.一个无条件匿名的签密算法[J].电子与信息学报,2004,26(4):435-439.
[9] 孙庆英,吴克力,徐会艳.一种可追踪签名者的环签密方案[J].计算机工程,2011,37(16):129-131.
[10] 吴春英,李顺东.高效的强(n,t,n)可验证秘密共享方案[J].计算机科学,2013,40(9):130-132.