[1]
Chaum D, Heyst E V: Group Signatures[C] Proceedings of Eurocrypt. Berlin: Springer-verlag, (1991), pp.257-265.
Google Scholar
[2]
Nakanishi T, Funabiki N: Group signature schemes with membership revocation for large groups[J] IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, (2006), 89( 5), pp.1275-1283.
DOI: 10.1093/ietfec/e89-a.5.1275
Google Scholar
[3]
He G, Tate S R: A group signature scheme with signature claiming and variable linkability [C] 25th IEEE International Performance, Computing and Communications Conference. Washington: IEEE Computer Society, (2006), pp.497-504.
DOI: 10.1109/.2006.1629445
Google Scholar
[4]
Zhang Jian-hong, Geng Qin: On the security of group signature scheme and designated verifier signature scheme[C] Proceedings of the 2008 IEEE International Conference on Networking, Architecture, and Storage. Washington: IEEE Computer Society, (2008).
DOI: 10.1109/nas.2008.21
Google Scholar
[5]
LiJun, Cui Guo-hua, Liu Zhi-yuan: Cryptanalysis and improvement of a group signature scheme[J]. Chinese Journal of Electronics,(2007), 35(4), pp.778-781.
Google Scholar
[6]
Zhou S, Lin D: Group signatures with reduced bandwidth[J]. IEE Proceedings: Information Security, (2006), 153(4) , pp.146-152.
DOI: 10.1049/ip-ifs:20055141
Google Scholar
[7]
Kim K, Lim S, Yie I, et al: Hierarchical identity based group signature with enhanced privacy of the signers[C]Proceedings of the 7th WSEAS International Conference on Applied Informatics and Communications. Greece: World Scientific and Engineering Academy and Society, (2007).
Google Scholar
[8]
Nakanishi T, Funabiki N: A short anonymously revocable group signature scheme from decision linear assumption[C]Proceedings of the 2008 ACM Symposium Information, Computer and Communications Security. NewYork: ACM Press, (2008), pp.337-340.
DOI: 10.1145/1368310.1368359
Google Scholar
[9]
Contini S , Yin Y: Forgery and partial key-recovery attacks on HMAC and NMAC using hash collisions[C] Lecture Notes in Computer Science. Berlin: Springer-Verlag, (2006), 4284, pp.37-53.
DOI: 10.1007/11935230_3
Google Scholar