[1] |
ZHENG Y. Digital signcryption or how to achieve cost(signature & encryption) << cost(signature) + cost(encryption)[C]. The 17th Annual International Cryptology Conference, Santa Barbara, USA, 1997: 165-179. doi: 10.1007/BFb0052234.
|
[2] |
SHAMIR A. Identity-based Cryptosystems and Signature Schemes[M]. BLAKLEY G R and CHAUM D. Advances in Cryptology. Berlin, Germany, Springer, 1985: 47–53. doi: 10.1007/3-540-39568-7_5.
|
[3] |
AL-RIYAMI S S and PATERSON K G. Certificateless public key cryptography[C]. The 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, China, 2003: 452–473. doi: 10.1007/978-3-540-40061-5_29.
|
[4] |
BARBOSA M and FARSHIM P. Certificateless signcryption[C]. 2008 ACM Symposium on Information, Computer and Communications Security, Tokyo, Japan, 2008: 369-372. doi: 10.1145/1368310.1368364.
|
[5] |
WU Chenhuang and CHEN Zhixiong. A new efficient certificateless signcryption scheme[C]. 2008 International Symposium on Information Science and Engineering, Shanghai, China, 2008: 661-664. doi: 10.1109/ISISE.2008.206.
|
[6] |
王星, 钱海峰. 高效的无证书签密方案[J]. 计算机工程与应用, 2011, 47(20): 62–64. doi: 10.3778/j.issn.1002-8331.2011.20.019WANG Xing and QIAN Haifeng. Efficient certificateless signcryption scheme[J]. Computer Engineering and Applications, 2011, 47(20): 62–64. doi: 10.3778/j.issn.1002-8331.2011.20.019
|
[7] |
周彦伟, 杨波, 王青龙. 安全的无双线性映射的无证书签密机制[J]. 软件学报, 2017, 28(10): 2757–2768. doi: 10.13328/j.cnki.jos.005150ZHOU Yanwei, YANG Bo, and WANG Qinglong. Secure certificateless signcryption scheme without bilinear pairing[J]. Journal of Software, 2017, 28(10): 2757–2768. doi: 10.13328/j.cnki.jos.005150
|
[8] |
MANDAL S, MOHANTY S, and MAJHI B. Universally Verifiable Certificateless Signcryption Scheme for MANET[M]. NATH V. Proceedings of the International Conference on Microelectronics, Computing & Communication Systems. Singapore: Springer, 2018: 77-89. doi: 10.1007/978-981-10-5565-2_7.
|
[9] |
LUO Ming and WAN Yuwei. An enhanced certificateless signcryption in the standard model[J]. Wireless Personal Communications, 2018, 98(3): 2693–2709. doi: 10.1007/s11277-017-4995-4
|
[10] |
YANG Guomin, TAN C H, HUANG Qiong, et al. Probabilistic public key encryption with equality test[C]. Cryptographers’ Track at the RSA Conference, San Francisco, USA, 2010: 119–131. doi: 10.1007/978-3-642-11925-5_9.
|
[11] |
MA Sha. Identity-based encryption with outsourced equality test in cloud computing[J]. Information Sciences, 2016, 328: 389–402. doi: 10.1016/j.ins.2015.08.053
|
[12] |
QU Haipeng, YAN Zhen, LIN Xijun, et al. Certificateless public key encryption with equality test[J]. Information Sciences, 2018, 462: 76–92. doi: 10.1016/j.ins.2018.06.025
|
[13] |
张玉磊, 陈文娟, 张永洁, 等. 支持关键字搜索的无证书密文等值测试加密方案[J]. 电子与信息学报, 2020, 42(11): 2713–2719. doi: 10.11999/JEIT190752ZHANG Yulei, CHEN Wenjuan, ZHANG Yongjie, et al. Certificateless puklic key encryption with equality test of supporting keyword search[J]. Journal of Electronics &Information Technology, 2020, 42(11): 2713–2719. doi: 10.11999/JEIT190752
|
[14] |
PBC Library. The pairing-based cryptography library[EB/OL]. http://crypto.stanford.edu/pbc/, 2015.
|