[1] |
SHAMIRR A . Identity-based cryptosystem and signature scheme[A]. Cryptology-Crypto 1984[C]. Berlin: Springer-Verlag, 1984.47-53.
|
[2] |
AL-RIYAMI S , PATERSON K . Certificateless public key cryptography[A]. Cryptology-Asiacrypt 2003[C]. Berlin: Springer-Verlag, 2003.452-473.
|
[3] |
BARBOSA M , FARSHIM P . Certificateless signcryption[A]. Proc of the ACM Symp on Information. Computer and Communications Security (ASIACCS 2008)[C]. 2008.369-372.
|
[4] |
ARANHA D , CASTROO R , LOPEZ J , et al. Efficient certificateless signcryption[EB/OL]. .
|
[5] |
WU C , CHEN Z . A new efficient certificateless signcryption scheme[A]. Proc of the ISISE 2008[C]. Beijing, China, 2008.661-664.
|
[6] |
SHARMILA D , VIVEK S , PANDU R . On the security of certificate-less signcryption schemes[EB/OL]. .
|
[8] |
WENG J , YAO G , DDENG R . Cryptanalysis of a certificateless sign-cryption scheme in the standard model[J]. Information Sciences, 2011,181(3):661-667.
|
[9] |
ZHOU C , ZHOU W , DONG X . Provable certificateless generalized signcryption scheme[J]. Designs Codes and Cryptography, 2012,71(2):1-16.
|
[10] |
CHEN L , CHENG Z , SMART N . Identity-based key agreement pro-tocols from pairings[J]. Internal Journal of Information Security, 2007,6(4):213-241.
|
[11] |
HE H , CHEN J , HU J . An ID-based proxy signature schemes without bilinear pairings[J]. Annals of Telecommunications, 2011,66(11-12):657-662.
|
[12] |
朱辉, 李晖, 王育民 . 不使用双线性对的无证书签密机制方案[J]. 计算机研究与发展, 2010,47(9):1587-1594. ZHU H , LI H , WANG Y M . Certificateless signcryption scheme with-out pairing[J]. Journal of Computer Research and Development, 2010,47(9):1587-1594.
|
[13] |
POINTCHEVAL D , STERN J . Security arguments for digital signatures and blind signatures[J]. Journal of Cryptology, 2000,13(3):361-396.
|
[7] |
LIU Z , HU Y , ZHANG X , MA H . Certificateless signcryption scheme in the standard model[J]. Information Sciences, 2010,180(1):452-464.
|
[14] |
CAO X , KOU W , DU X . A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges[J]. Information Sciences, 2010,180(15):2895-2903.
|