[1]
R.Rivest, A.Shamir, Y.Tauman. How to Leak a Secret[A]. In Lecture Notes in Computer Science[C], Berlin:Springer-Verlag,2001,2248,552-565.
DOI: 10.1007/3-540-45682-1_32
Google Scholar
[2]
Javier Herranz, German Saez. Forking Lemmas for Ring Signature Schemes,INDOCRYPT 2003,LNCS 2904,Springer-Verlag:266-279,2003.
DOI: 10.1007/978-3-540-24582-7_20
Google Scholar
[3]
Chandana Gamage, Ben Gras, Bruno Crispo and Andrew S Tanenbaum. An identity-based ring signature scheme with enhanced privacy. Proc Securecomm and Workshops, 2006:1-5.
DOI: 10.1109/seccomw.2006.359554
Google Scholar
[4]
Sherman S.M. Chow, Siu-Ming Yiu, and Lucas Chi Kwong Hui. Efficient identity based ring signature. In ACNS,2005:499-512.
Google Scholar
[5]
Fagen Li, Hu Xiong, and Yong Yu. An efficient id-based ring signcryption scheme.In International Conference on Communications, Circuits and Systems - 2008. ICCCAS 2008,pp:483–487. IEEE,2008.
DOI: 10.1109/icccas.2008.4657819
Google Scholar
[6]
Adam Bender, Jonathan Katz, and Ruggero Morselli. Ring signatures: Stronger definitions, and constructions without random oracles. In TCC, volume 3876 of Lecture Notes in Computer Science, pp: 60-79. Springer,2006.
DOI: 10.1007/11681878_4
Google Scholar
[7]
Emmanuel Bresson, Jacque Stern, Michael Szydlo. Threshold Ring Signatures and Applications to Ad-Hoc Groups(Extended abstract) [A].Lecture Notes in Computer Science [C] , Berlin: Springer-Verlag,2002, 2442:465-480.
DOI: 10.1007/3-540-45708-9_30
Google Scholar
[8]
Sherman S.M.Chow,Lucas C.K.Hui and S.M.Yiu.Identity Based Threshold Ring Signature[A]. In ICISC 2004,Lecture Notes in Computer Science [C] , Berlin : Springer – Verlag, 2005,3506:218-232.
Google Scholar