Zheng Y. Digital signcryption or how to achieve cost(signature encryption) cost (signature)+cost(encryption)[C][J].Advances in Cryptology-Crypto9.1997, LNCS 1294:165-179[2]Malone-Lee J. Identity based signcryption. cryptology ePrintarchive[R]. Report 2002/098, IACR, 2002.[3]南湘浩, 陈钟. 网络安全技术概论. 北京: 国防工业出版社,2003, 第2 章.Nan Xiang-hao and Chen Zhong. A Profile to NetworkSecurity Techniques[M]. Beijing: National Defence IndustryPress, 2003, Chapter 2.[4]Chen H Y, L S W, and Liu Z H, et al.. An identity-basedsigncryption scheme with short ciphertext from pairings[C].Emerging Directions in Embedded and UbiquitousComputing workshops 2006, 2006, LNCS 4097: 342-351.[5]Barbosa M and Farshim P. Certificateless signcryption[C].ACM Symposium on Information, Computer andCommunications Security, Tokyo, Japan. ACM, 2008:369-372.[6]Li F and Yu Y. An efficient and provably secure ID-basedthreshold signcryption scheme[C]. International conferenceon communications, circuits and systems. Xiamen, China,2008: 488-492.[7]Ren Y L and Gu D W. Efficient identity based signature/signcryption scheme in the standard model[C]. The 1thInternational Symposium on Data, Privacy and E-Commerce.Chengdu, China, 2007: 133-137.[8]Libert B and Quisquater J J. New identity based signcryptionschemes from pairings[C]. IEEE Information TheoryWorkshop. Paris, France, 2003: 155-158.[9]Ma C S. Efficient short signcryption scheme with publicverifiability[C]. Inscrypt 2006, 2006, LNCS 4318: 118-129.[10]Chen Y G.[J].Jia C F, and L S W, et al.. Signature schemewith arbitrary length message recovery in combined publickey[C]. The 4th International conference on Mobile Ad-hocand Sensor Networks. Wuhan, China.2008,:-[11]Zhong X, Dai G Z, and Yang D M. An efficient online/offlinesigncryption scheme for MANET [C]. IEEE AdvancedInformation Networking and Applications Workshops.Ontario, Canada, 2007: 171-176.
|