[1] Zheng Y L.Digital signcryption or how to achieve cost (signature & encryption)<[2] Ma Z,Li F H,Ma J F,et al.CL-TAP:An efficient certificateless based trusted access protocol for WLAN[J].Chinese Journal of Electronics,2014,23(1):142-146.
[3] 张宇,陈晶,杜瑞颖,等.适于车载网安全通信的高效签密方案[J].电子学报,2015,43(3):512-517. Zhang Yu,Chen Jing,Du Rui-ying,et al.An efficient signcryption scheme for secure communication of VANET[J].Acta Electronica Sinica,2015,43(3):512-517.(in Chinese)
[4] Sun Y X,Li H.Efficient signcryption between TPKI and IDPKC and its multi-receiver construction[J].Science China Information Sciences,2010,53(3):557-566.
[5] Huang Q,Wong D S,Yang G M.Heterogeneous signcryption with key privacy[J].The Computer Journal,2011,54(4):525-536.
[6] Fu X T,Li X W,Liu W.IDPKC-to-TPKI construction of multi-receiver signcryption[A].Proceedings of the INCoS(5)[C].Xian:IEEE,2013.335-339.
[7] Li F G,Zhang H,Takagi T.Efficient signcryption for heterogeneous systems[J].IEEE Systems Journal,2013,7(3):420-429.
[8] Shamir A.Identity-based cryptosystems and signature schemes[A].Advances in Cryptology[C].Heidelberg:Springer,1985.47-53.
[9] Libert B,Quisquater J.Efficient signcryption with key privacy from gap Diffie-Hellman groups[A].Advances in Public Key Cryptography-PKC[C].Berlin,Springer,2004.187-200.
[10] Boneh D,Lynn B,Shacham H.Short signatures from the Weil pairing[A].Advances in Cryptology-Asiacrypt[C].Berlin:Springer,2001.514-532.
[11] Yang G M,Wong D S,Deng X T.Analysis and improvement of a signcryption scheme with key privacy[A].Advances in Public Key Cryptography-PKC[C].Berlin,Springer,2005.218-232.
[12] Li C K,Yang G M,Wong D S,et al.An efficient signcryption scheme with key privacy and its extension to ring signcryption[J].Journal of Computer Security,2010,18(3):451-473.
[13] Al-Riyami S,Paterson K.Certificateless public key cryptography[A].Advances in the Cryptology-Asiacrypt[C].Berlin:Springer,2003.452-474.
[14] An J H,Dodis Y,Rabin T.On the security of joint signature and encryption[A].Advance in Cryptography-EUROCRYPT[C].Berlin,Springer,2002.83-107.
[15] Barbosa M,Farshim P.Certificateless signcryption[A] Proceedings of the ACM Symposium on Information,Computer and Communications Security (ASIACCS)[C].Tokyo:ACM,2008.69-372.
[16] Pointcheval D,Jacques S.Security proofs for signature schemes[A].Advances in Cryptology-Eurocrypt[C].Berlin:Springer,1996.387-398. |