共 9 条
[1]
Zheng Y., Digital signcryption or how to achieve cost (signature & encryption) ≪cost (signature) + Cost (encryption), Proc Advances in Cryptology-CRYPTO'97, LNCS 1294, pp. 165-179, (1997)
[2]
Shamir A., Identity-based cryptosystems and signature Schemes, Proc. Advances in Cryptology-CRYPTO'84, LNCS 196, pp. 47-53, (1984)
[3]
Boneh D., Franklin M., Identity-based encryption from the weil pairing, Proc Advances in Cryptology-CRYPTO 2001, LNCS 2139, pp. 213-229, (2001)
[4]
Rivest R.L., Shamir A., Tauman Y., How to leak a secret, Proc Advances in Cryptology-ASIACRYPT 2001, LNCS 2248, pp. 552-565, (2001)
[5]
Zhang F., Kim K., ID-based blind signature and ring signature from pairings, Proc Advances in Cryptology-ASIACRYPT 2002, LNCS 2501, pp. 533-547, (2002)
[6]
Huang X., Susilo W., Mu Y., Zhang F., Identity-based ring signcryption schemes: cryptographic primitives for preserving privacy and authenticity in the ubiquitous world, Proc Advanced Information Networking and Applications-AINA 2005, pp. 649-654, (2005)
[7]
Zhang M., Yang B., Zhu S., Et al., Efficient secret authenticatable anonymous signcryption scheme with identity privacy, Proc Intelligence and Security Informatics-ISI 2008, LNCS 5075, pp. 126-137, (2008)
[8]
An J.H., Dodis Y., Rabin T., On the security of joint signature and encryption, Proc Advances in Cryptology-EUROCRYPT 2002, LNCS 2332, pp. 83-107, (2002)
[9]
Li F., Shirase M., Takagi T., Analysis and improvement of authenticatable ring signcryption scheme, (2008)