ZHENG Y. Digital signcryption or how to achieve cost (signature encryption)cost(signature)+cost (encryption)[C]. Proceedings of the Cryptology- CRYPTO1997, California, USA, 1997: 165-179. doi: 10. 1007/BFb0052234.
|
PAN Chunhua, LI Shunpeng, ZHU Qihui, et al. Notes on proxy signcryption and multi-proxy signature schemes[J]. International Journal of Network Security, 2015, 17(1): 29-33.
|
项顺伯, 徐兵, 柯文德. 基于身份的在线/离线广播签密方案[J]. 四川大学学报(工程科学版), 2016, 48(2): 156-161. doi: 10.1007/BFb0052234.10.15961/j.jsuese.2016.02.023.
|
XIANG Shunbo, XU Bing, and KE Wende. Identity-based online /offline broadcast signcryption scheme[J]. Journal of Sichuan University (Engineer Science), 2016, 48(2): 156-161. doi: 10.1007/BFb0052234.10.15961/j.jsuese.2016.02.023.
|
李慧贤, 巨龙飞. 对一个匿名多接收者签密方案的安全性分析与改进[J]. 电子学报, 2015, 43(11): 2187-2193. doi:10.3969 /j. issn.0372-2112.2015.11.008.
|
LI Huixian and JU Longfei. Security analysis and improvement of an anonymous multi-receiver signcryption scheme[J]. Acta Electronica Sinica, 2015, 43(11): 2187-2193. doi: 10.3969/j.issn.0372-2112.2015.11.008.
|
张玉磊, 王欢, 李臣意, 等. 可证安全的紧致无证书聚合签密方案[J]. 电子与信息学报, 2015, 37(12): 2838-2844. doi: 10.11999/JEIT150407.
|
ZHANG Yulei, WANG Huan, LI Chenyi, et al. Provable secure and compact certificateless aggregate signcryption Scheme[J]. Journal of Electronics Information Technology, 2015, 37(12): 2838-2844. doi: 10.11999/JEIT150407.
|
刘雪峰, 张玉清, 王鹤, 等. 一种后向撤销隐私安全的车载自组织网络快速匿名消息认证协议[J]. 电子与信息学报, 2014, 36(1): 94-100. doi: 10.3724/SP.J.1146.2013.00342.
|
LIU Xuefeng, ZHANG Yuqing, WANG He, et al. An efficient anonymity message authentication with backward secure revocation for vehicular Ad hoc networks[J]. Journal of Electronics Information Technology, 2014, 36(1): 94-100. doi: 10.3724/SP.J.1146.2013.00342.
|
张宇, 陈晶, 杜瑞颖, 等. 适于车载网安全通信的高效签密方案[J]. 电子学报, 2015, 43(3): 512-517. doi: 10.3969/j.issn. 0372-2112.2015.03.015.
|
ZHANG Yu, CHEN Jing, DU Ruiying, et al. An efficient signcryption scheme for secure communication of VANET[J]. Acta Electronica Sinica, 2015, 43(3): 512-517. doi: 10.3969/j. issn.0372-2112.2015.03.015.
|
TAN C. Signcryption scheme in multi-user setting without random oracles[C]. Proceedings of the 3rd International Workshop on Security, Kagawa, Japan, 2008: 64-82. doi: 10.1007/978-3-540-89598-5_5.
|
LI Fageng and TAKAGI T. Secure identity-based signcryption in the standard model[J]. Mathematical Computer Modelling, 2013, 57(11/12): 2685-2694. doi: 10.1016/j.mcm.2011.06.043.
|
LI Xiangxue, QIAN Haifeng, WENG Jian, et al. Fully secure identity-based signcryption scheme with shorter signcryptext in the standard model[J]. Mathematical Computer Modelling, 2013, 57(3/4): 503-511. doi: 10.1016/j.mcm. 2012.06.030.
|
LI Fageng, ZHANG Mingwu, and TSUYOSHI T. Efficient signcryption in the standard model[J]. Concurrency Computation Practice Experience, 2012, 24(17): 1977-1989. doi: 10.1002/cpe.1823.
|
SUN Yinxia and LI Hui. Efficient signcryption between TPKC and IDPKC and its multi-receiver construction[J]. Sciece China Information Sciences, 2010, 53(3): 557-566. doi: 10.1007/s11432-010-0061-5.
|
HUANG Qiong, DUN C, and YAN Guomin. Heterogeneous signcryption with key privacy[J]. Computer Journal, 2011, 54(4): 525-536. doi: 10.1093/comjnl/bxq095.
|
LI Fageng, ZHANG Hui, and TAKAGI T. Efficient signcryption for heterogeneous systems[J]. IEEE Systems Journal, 2013, 7(3): 420-429. doi: 10.1109/JSYST.2012. 2221897.
|
SHOUP V. OAEP Reconsidered[J]. Journal of Cryptology, 2000, 15(4): 223-249. doi: 10.1007/3-540-44647-8_15.
|