1. Lecture Notes in Computer Science;M. Abe,2002
2. Adida, B., Hohenberger, S., Rivest, R.L.: Ad-hoc-group signatures from hijacked keypairs (2005), available at,
http://theory.lcs.mit.edu/~srhohen/papers/AHR.pdf
3. Lecture Notes in Computer Science;M. Bellare,2003
4. Bender, A., Katz, J., Morselli, R.: Ring signatures: Stronger definitions, and constructions without random oracles. Cryptology ePrint Archive (2005),
http://eprint.iacr.org/2005/304
5. Lecture Notes in Computer Science;E. Bresson,2002