[1]
|
Chaum, D. and Van Heyst, E. (1991) Group Signatures. In: Advances in Cryptology EUROCRYPT’91. LNCS 547, Springer-Verlag, Berlin, 257-265.
|
[2]
|
Camenisch, J. and Stadler, M. (1997) Effient Group Signature Schemes for Large Groups. Proceedings of CRYPT’97, Lecture Notes in Computer Science, Springer-Verlag, Berlin, 410-424.
|
[3]
|
Bresson, E. and Stern, J. (1999) Efficient Revocation in Group Signature. In: Kim, K., Ed., PKC2001, LNCS1992, Springer-Verlag, Berlin, 190-206.
|
[4]
|
Wang, S.P., Wang, Y.M. and Wang, X. (2003) A New Solution Scheme for the Member Deletion Problem in Group Signature by Use of Renew Operator. Journal of Software, 14, 1911-1917.
|
[5]
|
Li, X.S. and Hu, Y.P. (2008) Analysis and Improvement for a Group Signature Member Deletion Scheme. Journal of Xidian University, 35, 478-482.
|
[6]
|
Huang, Z.J. and Lin, X.Z. (2005) A Group Member Deletion Scheme Cryptanalysis. Journal of Software, 16.
|
[7]
|
Ateniese, G. and Medeiros, B.D. (2003) Efficient Group Signatures without Trapdoors. In: Advances of ASIACRYPT’03. LNCS2894, Springer-Verlag, Berlin, 246-268.
|
[8]
|
Chow, S.S.M. (2009) Blind Signature and Ring Signature Schemes: Rehabilitation and Attack. Computer Standards & Interfaces, 31, 707-712.
|
[9]
|
Zhang, J.H., Chen, H. and Qin, G. (2009) Cryptoanalysis of Certificateless Partially Blind Signature and Proxy Blind Signature Scheme. Proceedings of the 2009 2nd International Congress on Image and Signal Processing (CISP), 5.
|
[10]
|
Zhao, W., Lin, C. and Ye, D.F. (2009) Provably Secure Convertible Nominative Signature Scheme. Information Security and Cryptology 4th International Conference, Revised Selected Papers, 23-40.
|
[11]
|
Zhang, J.H. and Qin, G. (2008) On the Security of Group Signature Scheme and Designated Verifier Signature Scheme. 2008 International Conference on Networking, Architecture, and Storage (NAS), June 2008, 351-358.
|