共 17 条
- [1] Shamir A., Identity-based cryptosystem and signature scheme, Proceedings of the CRYPT 1984, pp. 47-53, (1984)
- [2] Al-Riyami S., Paterson K.G., Certificateless public key cryptography, Proceedings of the 9th International Conference on the Theory and Application of Cryptology and Information Security, pp. 452-474, (2003)
- [3] Yu G., Han W.-B., Certificateless signcryption scheme with proxy unsigncryption, Chinese Journal of Computers, 34, 7, pp. 1291-1299, (2011)
- [4] Liu Z., Hu Y., Zhang X., Et al., Certificateless signcryption scheme in the standard model, Information Sciences, 180, 3, pp. 452-464, (2010)
- [5] Li H.-X., Chen X.-B., Pang L.-J., Wang Y.-M., Certificateless multi-receiver signcryption scheme based on multivariate public key cryptography, Chinese Journal of Computers, 35, 9, pp. 1881-1889, (2012)
- [6] Cramer R., Shoup V., Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack, SIAM Journal on Computing, 33, 1, pp. 167-226, (2003)
- [7] Abe M., Gennaro R., Kurosawa K., Tag-KEM/DEM: A new framework for hybrid encryption, Journal of Cryptology, 21, 1, pp. 97-130, (2008)
- [8] Kurosawa K., Desmedt Y., A new paradigm of hybrid encryption scheme, Proceedings of the 24th Annual International Cryptology Conference, pp. 426-442, (2004)
- [9] Bentahar K., Farshim P., Malone-Lee J., Smart N.P., Generic constructions of identity-based and certificateless KEMs, Journal of Cryptology, 21, 2, pp. 178-199, (2008)
- [10] Huang Q., Wong D., Generic certificateless encryption secure against malicious-but-passive KGC attacks in the standard model, Journal of Computer Science and Technology, 25, 4, pp. 807-826, (2010)