Citation: | ZHANG Yulei, WANG Huan, LIU Wenjing, WANG Caifen. Security Analysis and Improvement of Mutual Signcryption Schemes under Heterogeneous Systems[J]. Journal of Electronics & Information Technology, 2017, 39(12): 3045-3050. doi: 10.11999/JEIT170203 |
LIBERT B and QUISQUATER J J. Improved signcryption from q-Diffie-Hellman problems[C]. International Conference on Security in Communication Networks, Amalfi, Italy, 2004: 220-234. doi: 10.1007/978-3-540-30598-9_16.
|
SUN Y X and LI H. Efficient signcryption between TPKC and IDPKC and its multi-receiver construction[J]. Science China Information Sciences, 2010, 53(3): 557-566. doi: 10.1007/s11432-010-0061-5.
|
HUANG Q, WONG D S, and YANG G M. Heterogeneous signcryption with key privacy[J]. The Computer Journal, 2011, 54(4): 525-536.doi: 10.1093/comjnl/bxq095.
|
FU X T, LI X W, and LIU W. IDPKC-to-TPKC construction of multi-receiver signcryption[C]. International Conference on Intelligent Networking and Collaborative Systems (INCoS), Xi,an, China, 2013: 335-339. doi: 10.1109/INCoS.2013.62.
|
LI F G, ZHANG H, and TAKAGI T. Efficient signcryption for heterogeneous systems[J]. IEEE Systems Journal, 2013, 7(3): 420-429. doi: 10.1109/JSYST.2012.2221897.
|
张玉磊, 张灵刚, 张永洁, 等. 匿名CLPKC-TPKI异构签密方案[J]. 电子学报, 2016, 44(6): 2432-2439. doi: 10.3969/ j.issn.0372-2112.2016.10.022.
|
ZHANG Y L, ZHANG L G, ZHANG Y J, et al. CLPKC to TPKI heterogeneous signcryption scheme with anonymity[J]. Acta Electronica Sinica, 2016, 44(6): 2432-2439. doi: 10.3969/ j.issn.0372-2112.2016.10.022.
|
LI F G, HAN Y N, and JIN C H. Practical signcryption for secure communication of wireless sensor networks[J]. Wireless Personal Communications, 2016, 89(4): 1391-1412. doi: 10.1007/s11277-016-3327-4.
|
刘景伟, 张俐欢, 孙蓉. 异构系统下的双向签密方案[J]. 电子与信息学报, 2016, 38(11): 2948-2953. doi: 10.11999/JEIT 160056.
|
LIU J W, ZHANG L H, and SUN R. Mutual signcryption schemes under heterogeneous systems[J]. Journal of Electronics Information Technology, 2016, 38(11): 2948-2953. doi: 10.11999/JEIT160056.
|
AN J H, DODIS Y, and RABIN T. On the security of joint signature and encryption[C]. Proceedings of the Cryptology- EUROCRYPT 2002, Amsterdam, the Netherlands, 2002: 83-107. doi: 10.1007/3-540-46035-7_6.
|
ZHANG L, WU Q H, QIN B, et al. Identity-based authenticated asymmetric group key agreement protocol[J]. Journal of Computer Research Development, 2010, 6196(19): 510-519. doi: 10.1007/978-3-642-14031-0_54.
|