共 17 条
[1]
Shamir A., Identity-based cryptosystem and signature scheme, Proceedings of the CRYPT 1984, pp. 47-53, (1984)
[2]
Al-Riyami S., Paterson K.G., Certificateless public key cryptography, Proceedings of the 9th International Conference on the Theory and Application of Cryptology and Information Security, pp. 452-474, (2003)
[3]
Yu G., Han W.-B., Certificateless signcryption scheme with proxy unsigncryption, Chinese Journal of Computers, 34, 7, pp. 1291-1299, (2011)
[4]
Liu Z., Hu Y., Zhang X., Et al., Certificateless signcryption scheme in the standard model, Information Sciences, 180, 3, pp. 452-464, (2010)
[5]
Li H.-X., Chen X.-B., Pang L.-J., Wang Y.-M., Certificateless multi-receiver signcryption scheme based on multivariate public key cryptography, Chinese Journal of Computers, 35, 9, pp. 1881-1889, (2012)
[6]
Cramer R., Shoup V., Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack, SIAM Journal on Computing, 33, 1, pp. 167-226, (2003)
[7]
Abe M., Gennaro R., Kurosawa K., Tag-KEM/DEM: A new framework for hybrid encryption, Journal of Cryptology, 21, 1, pp. 97-130, (2008)
[8]
Kurosawa K., Desmedt Y., A new paradigm of hybrid encryption scheme, Proceedings of the 24th Annual International Cryptology Conference, pp. 426-442, (2004)
[9]
Bentahar K., Farshim P., Malone-Lee J., Smart N.P., Generic constructions of identity-based and certificateless KEMs, Journal of Cryptology, 21, 2, pp. 178-199, (2008)
[10]
Huang Q., Wong D., Generic certificateless encryption secure against malicious-but-passive KGC attacks in the standard model, Journal of Computer Science and Technology, 25, 4, pp. 807-826, (2010)