| Citation: | ZHANG Yulei, WANG Huan, LIU Wenjing, WANG Caifen. Security Analysis and Improvement of Mutual Signcryption Schemes under Heterogeneous Systems[J]. Journal of Electronics & Information Technology, 2017, 39(12): 3045-3050. doi: 10.11999/JEIT170203 | 
 
	                | LIBERT B and QUISQUATER J J. Improved signcryption from q-Diffie-Hellman problems[C]. International Conference on Security in Communication Networks, Amalfi, Italy, 2004: 220-234. doi:  10.1007/978-3-540-30598-9_16. | 
| SUN Y X and LI H. Efficient signcryption between TPKC and IDPKC and its multi-receiver construction[J]. Science China Information Sciences, 2010, 53(3): 557-566. doi:  10.1007/s11432-010-0061-5. | 
| HUANG Q, WONG D S, and YANG G M. Heterogeneous signcryption with key privacy[J]. The Computer Journal, 2011, 54(4): 525-536.doi:  10.1093/comjnl/bxq095. | 
| FU X T, LI X W, and LIU W. IDPKC-to-TPKC construction of multi-receiver signcryption[C]. International Conference on Intelligent Networking and Collaborative Systems (INCoS), Xi,an, China, 2013: 335-339. doi:  10.1109/INCoS.2013.62. | 
| LI F G, ZHANG H, and TAKAGI T. Efficient signcryption for heterogeneous systems[J]. IEEE Systems Journal, 2013, 7(3): 420-429. doi:  10.1109/JSYST.2012.2221897. | 
| 张玉磊, 张灵刚, 张永洁, 等. 匿名CLPKC-TPKI异构签密方案[J]. 电子学报, 2016, 44(6): 2432-2439. doi: 10.3969/ j.issn.0372-2112.2016.10.022. | 
| ZHANG Y L, ZHANG L G, ZHANG Y J, et al. CLPKC to TPKI heterogeneous signcryption scheme with anonymity[J]. Acta Electronica Sinica, 2016, 44(6): 2432-2439. doi: 10.3969/ j.issn.0372-2112.2016.10.022. | 
| LI F G, HAN Y N, and JIN C H. Practical signcryption for secure communication of wireless sensor networks[J]. Wireless Personal Communications, 2016, 89(4): 1391-1412. doi:  10.1007/s11277-016-3327-4. | 
| 刘景伟, 张俐欢, 孙蓉. 异构系统下的双向签密方案[J]. 电子与信息学报, 2016, 38(11): 2948-2953. doi: 10.11999/JEIT 160056. | 
| LIU J W, ZHANG L H, and SUN R. Mutual signcryption schemes under heterogeneous systems[J]. Journal of Electronics  Information Technology, 2016, 38(11): 2948-2953. doi:  10.11999/JEIT160056. | 
| AN J H, DODIS Y, and RABIN T. On the security of joint signature and encryption[C]. Proceedings of the Cryptology- EUROCRYPT 2002, Amsterdam, the Netherlands, 2002: 83-107. doi:  10.1007/3-540-46035-7_6. | 
| ZHANG L, WU Q H, QIN B, et al. Identity-based authenticated asymmetric group key agreement protocol[J]. Journal of Computer Research  Development, 2010, 6196(19): 510-519. doi:  10.1007/978-3-642-14031-0_54. | 
