|
[1]
|
Diffie, W. and Hellman, M. (1976) New Directions in Cryptography. IEEE Transactions on Information Theory, 22, 644-654.
|
|
[2]
|
Shamir, A. (2000) Identity-Based Cryptosystems and Signature Schemes. In: Blakley, G.R. and Chaum, D., Eds., Advances in Cryptology, Springer, 47-53. [Google Scholar] [CrossRef]
|
|
[3]
|
Al-Riyami, S.S. and Paterson, K.G. (2003) Certificateless Public Key Cryptography. In: Laih, C.S., Ed., Advances in Cryptology—ASIACRYPT 2003, Springer, 452-473. [Google Scholar] [CrossRef]
|
|
[4]
|
王艳, 江明明, 郭宇燕, 等. 基于格密码的高效无证书签名方案[J]. 江苏师范大学学报(自然科学版), 2019, 37(2): 63-66.
|
|
[5]
|
Kim, K.S. and Jeong, I.R. (2014) A New Certificateless Signature Scheme under Enhanced Security Models. Security and Communication Networks, 8, 801-810. [Google Scholar] [CrossRef]
|
|
[6]
|
梁红梅. 格上无陷门的无证书签名[J]. 闽南师范大学学报(自然科学版), 2021, 34(4): 32-38.
|
|
[7]
|
Yu, S., Dou, K., Zhao, H. and Han, Y. (2023) An Efficient Certificateless Signature Scheme on Lattice. Second International Conference on Electronic Information Technology (EIT 2023), Wuhan, 17-19 March 2023, 662-667. [Google Scholar] [CrossRef]
|
|
[8]
|
Xu, S., Yu, S., Yue, Z. and Liu, Y. (2024) CLLS: Efficient Certificateless Lattice-Based Signature in VANETs. Computer Networks, 255, Article ID: 110858. [Google Scholar] [CrossRef]
|
|
[9]
|
Gentry, C., Sahai, A. and Waters, B. (2013) Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-based. In: Canetti, R. and Garay, J.A., Eds., Advances in Cryptology—CRYPTO 2013, Springer, 75-92. [Google Scholar] [CrossRef]
|
|
[10]
|
Wang, F., Wang, K. and Li, B. (2015) An Efficient Leveled Identity-Based FHE. In: Qiu, M., Xu, S., Yung, M. and Zhang, H., Eds., Network and System Security, Springer, 303-315. [Google Scholar] [CrossRef]
|
|
[11]
|
康元基, 顾纯祥, 郑永辉, 等. 利用特征向量构造基于身份的全同态加密体制[J]. 软件学报, 2016, 27(6): 1487-1497.
|
|
[12]
|
辛丹, 顾纯祥, 郑永辉, 等. 利用RLWE构造基于身份的全同态加密体制[J]. 电子学报, 2016, 44(12): 2887-2893.
|
|
[13]
|
Li, M. (2020) Leveled Certificateless Fully Homomorphic Encryption Schemes from Learning with Errors. IEEE Access, 8, 26749-26763. [Google Scholar] [CrossRef]
|
|
[14]
|
吴华麟, 陈文彬, 高崇志, 等. 同态签名研究综述[J]. 密码学报, 2021, 8(5): 758-777.
|
|
[15]
|
Gorbunov, S., Vaikuntanathan, V. and Wichs, D. (2015) Leveled Fully Homomorphic Signatures from Standard Lattices. Proceedings of the Forty-Seventh Annual ACM symposium on Theory of Computing, Portland, 14-17 June 2015, 469-477. [Google Scholar] [CrossRef]
|
|
[16]
|
Boyen, X., Fan, X. and Shi, E. (2014) Adaptively Secure Fully Homomorphic Signatures Based on Lattices. http://eprint.iacr.org/2014/916.pdf
|
|
[17]
|
Wang, F., Wang, K., Li, B. and Gao, Y. (2015) Leveled Strongly-Unforgeable Identity-Based Fully Homomorphic Signatures. In: Lopez, J. and Mitchell, C., Eds., Information Security, Springer, 42-60. [Google Scholar] [CrossRef]
|
|
[18]
|
Wang, Y. and Wang, M. (2020) A New Fully Homomorphic Signatures from Standard Lattices. In: Yu, D., Dressler, F. and Yu, J., Eds., Wireless Algorithms, Systems, and Applications, Springer, 494-506. [Google Scholar] [CrossRef]
|
|
[19]
|
Wang, C., Wu, B. and Yao, H. (2020) Leveled Adaptively Strong-Unforgeable Identity-Based Fully Homomorphic Signatures. IEEE Access, 8, 119431-119447. [Google Scholar] [CrossRef]
|
|
[20]
|
Dodis, Y., Reyzin, L. and Smith, A. (2004) Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data. In: Cachin, C. and Camenisch, J.L., Eds., Advances in Cryptology—EUROCRYPT 2004, Springer, 523-540. [Google Scholar] [CrossRef]
|
|
[21]
|
Micciancio, D. and Regev, O. (2007) Worst‐Case to Average‐Case Reductions Based on Gaussian Measures. SIAM Journal on Computing, 37, 267-302. [Google Scholar] [CrossRef]
|
|
[22]
|
Gentry, C., Peikert, C. and Vaikuntanathan, V. (2008) Trapdoors for Hard Lattices and New Cryptographic Constructions. Proceedings of the Fortieth Annual ACM Symposium on Theory of Computing, Victoria, 17-20 May 2008, 197-206. [Google Scholar] [CrossRef]
|
|
[23]
|
Alwen, J. and Peikert, C. (2010) Generating Shorter Bases for Hard Random Lattices. Theory of Computing Systems, 48, 535-553. [Google Scholar] [CrossRef]
|
|
[24]
|
Micciancio, D. and Peikert, C. (2012) Trapdoors for Lattices: Simpler, Tighter, Faster, Smaller. In: Pointcheval, D. and Johansson, T., Eds., Advances in Cryptology—EUROCRYPT 2012, Springer, 700-718. [Google Scholar] [CrossRef]
|
|
[25]
|
Agrawal, S., Boneh, D. and Boyen, X. (2010) Lattice Basis Delegation in Fixed Dimension and Shorter-Ciphertext Hierarchical IBE. In: Rabin, T., Ed., Advances in Cryptology—CRYPTO 2010, Springer, 98-115. [Google Scholar] [CrossRef]
|