共 18 条
[1]
Al-Riyami S.S., Paterson K.G., Certificateless public key cryptography, ASIACRYPT, 2894, pp. 452-473, (2003)
[2]
Shamir A., Identity-based cryptosystems and signature schemes, CRYPTO, 196, pp. 47-53, (1984)
[3]
Boneh D., Franklin M., Identity-based encryption from the Weil pairing, CRYPTO, 2139, pp. 213-229, (2001)
[4]
Zheng Y., Digital signcryption or how to achieve cost (Signature & encryption) << cost(Signature) + cost (Encryption), CRYPTO, 1294, pp. 165-179, (1997)
[5]
An J.H., Dodis Y., Rabin T., On the security of joint signature and encryption, EUROCRYPT, 2332, pp. 83-107, (2002)
[6]
Boyen X., Multipurpose identity-based signcryption: A swiss army knife for identity-based cryptography, Cryptology-CRYPTO, 2729, pp. 383-399, (2003)
[7]
Barreto P.S.L.M., Libert B., McCullagh N., Quisquater J.J., Efficient and provably-secure identity-based signatures and signcryption from bilinear maps, Asiacrypt, 3788, pp. 515-532, (2005)
[8]
Li F.-G., Hu Y.-P., Li G., An efficient identity-based signcryption scheme, Chinese Journal of Computers, 29, 9, pp. 1641-1647, (2006)
[9]
Barbosa M., Farshim P., Certificateless signcryption, ACM Symposium on Information, Computer and Communications Security-ASIACCS, pp. 369-372, (2008)
[10]
Wu C.-H., Chen Z.-X., A new efficient certificateless signcryption scheme, International Symposium on Information Science and Engineering, pp. 661-664, (2008)