共 33 条
[1]
Zheng Y., Digital signcryption or how to achieve cost (signature & encryption) < cost (signature) + cost (encryption). CRYPTO’97, LNCS #1924, pp. 165-179, (1997)
[2]
Zheng Y., Imai H., How to construct efficient signcryption schemes on elliptic curves, Inf Process Lett, 68, pp. 227-233, (1998)
[3]
Malone-Lee J., Mao W., Two birds one stone: Signcryption using RSA, Proceedings of the Topics in Cryptology-CT-RSA’03, LNCS 2612, San Francisco, CA, USA, 13–17 April, 2003, pp. 210-224, (2003)
[4]
Shamir A., Identity-based cryptosystems and signature schemes, Proceedings of the Advances in Cryptology-CRYPTO’84, LNCS 196, Santa Barbara, CA, USA, 19–22 August, 1984, pp. 47-53, (1984)
[5]
Boneh D., Franklin M., Identity-based encryption from the weil pairing, Proceedings of the Advances in Cryptology-CRYPTO’01, LNCS 2139, Santa Barbara, CA, USA, 19–23 August 2001, pp. 213-229, (2001)
[6]
Malone-Lee J., Identity based signcryption, Cryptology Eprint Archive, Report 2002/098, (2002)
[7]
Libert B., Quisquator J.J., A new identity based signcryption scheme from pairings, Proceedings of the IEEE Information Theory Workshop-ITW’03, Paris, France, 31 March–4 April, 2003, pp. 155-158, (2003)
[8]
Chow S.S.M., Yiu S.M., Hui L.C.K., Chow K.P., Efficient forward and provably secure ID-based signcryption scheme with public verifiability and public ciphertext authenticity, Proceedings of the Information Security and Cryptology-ICISC’03, LNCS 2971, Seoul, Korea, 27–28 November, 2004, pp. 352-369, (2004)
[9]
Boyen X., Multipurpose identity based signcryption: A Swiss army knife for identity based cryptography, Proceedings of the Advance in Cryptology-CRYPTO’03, pp. 383-399, (2003)
[10]
Yu Y., Yang B., Sun Y., Zhu S., Identity based signcryption scheme without random oracles, Comput Stand Interfaces, 31, pp. 56-62, (2009)