[1] |
ZHENG Y . Digital signcryption or how to achieve cost (signature &encryption) << cost (signature) + cost (encryption)[A]. Proc of the 17th Annual International Cryptology Conference on Advances in Cryptology[C]. London,UK, 1997.165-179.
|
[2] |
SHAMIR A . Identity-based cryptosystem and signature scheme[A]. Proc of CRYPTO 1984[C]. Santa Barbara,California,USA, 1985.120-126.
|
[3] |
HUANG X , SUSILO W , MU Y , et al. Identity-based ring signcryption schemes:cryptographic primitives for preserving privacy and authen-ticity in the ubiquitous world[A]. Proc of the 19th International Con-ference on Advanced Information Networking and Applications[C]. Taipei,China, 2005.649-654.
|
[4] |
YU Y , LI F , XU C , et al. An efficient identity-based anonymous signcryption scheme[J]. Wuhan University Journal of Natural Sciences, 2008,13(6): 670-674.
|
[5] |
LI F , XIONG H , YU Y . An efficient id-based ring signcryption scheme[A]. Proc of 2008 International Conference on Communica-tions,Circuits and Systems[C]. Shanghai,China, 2008.483-487.
|
[6] |
ZHU Z , ZHANG Y , WANG F . An efficient and provable secure identity based ring signcryption scheme[J]. Computer Standard and Interface, 2008,31(6): 1092-1097.
|
[7] |
LI F , SHIRASE M , TAKAI T . Analysis and improvement of authen-ticatable ring signcryption scheme[J]. Journal of Shanghai Jiaotong University (Science), 2008,13(6): 679-683.
|
[8] |
ZHANG J , GAO S , CHEN H , et al. A novel id-based anonymous signcryption scheme[A]. Proc of the Advances in Data and Web Management Joint International Conference[C]. Suzhou,China, 2009.604-610.
|
[9] |
ZHANG M , ZHONG Y , YANG B , et al. Analysis and improvement of an id-based anonymous signcryption model[A]. Proc of 5th Interna-tional Conference on Intelligent Computing[C]. Ulsan,South Korea, 2009.433-442.
|
[10] |
SELVI S , VIVEK S , RANGAN C . Identity based ring signcryption schemes revisited[J]. Journal of Math-for Industry, 2011,3:33-46.
|
[11] |
GAURAV S , SUMAN B , ANIL K . An identity-based ring signcryption scheme[A]. IT Convergence and Security 2012,Lecture Notes in Electrical Engineering 215[C]. 2012.151-157.
|
[12] |
DUAN S , CAO Z . Efficient and provably secure multi-receiver identity-based signcryption[A]. Proc of the Information Security and Privacy 11th Australasian Conference[C]. Melbourne,Australia, 2006.195-206.
|
[13] |
YU Y , YANG B , HUANG X , et al. Efficient identity-based signcryp-tion scheme for multiple receivers[A]. Proc of 4th International Con-ference on Autonomic and Trusted Computing[C]. Hong Kong,China, 2007.13-21.
|
[14] |
LAL S , KUSHWAH P . Anonymous ID based signcryption scheme for multiple receivers[EB/OL]. . 2009.
|
[15] |
ZHANG B , XU Q . An ID-based anonymous signcryption scheme for multiple receivers secure in the standard model[A]. Proc of the 4th In-ternational Conference on Information Security and Assurance[C]. Miyazaki,Japan, 2010.15-27.
|
[16] |
庞辽军, 崔静静, 李慧贤 , 等. 新的基于身份的多接收者匿名签密方案[J]. 计算机学报, 2011,34(11): 2104-2113. PANG L J , CUI J J , LI H X , et al. A new multi-receiver ID-based anonymous signcryptionc[J]. Chinese Journal of Computers, 2011,34(11): 2104-2113.
|
[17] |
李慧贤, 陈绪宝, 巨龙飞 , 等. 改进的多接收者签密方案[J]. 计算机研究与发展, 2013,50(7): 1418-1425. LI H X , CHEN X B , JU L F , et al. Improved multi-receiver signcryp-tion scheme[J]. Journal of Computer Research and Development, 2013,50(7): 1418-1425.
|
[18] |
庞辽军, 高璐, 裴庆祺 , 等. 基于身份公平的匿名多接收者签密方案[J]. 通信学报, 2013,34(8): 161-168. PANG L J , GAO L , PEI Q Q , et al. Fair and anonymous ID-based multi-receiver signcryption[J]. Journal on Communications, 2013,34(8): 161-168.
|
[19] |
PANG L , LI H , GAO L , et al. Completely anonymous multi-recipient signcryption scheme with public verification[J]. PLoS ONE, 2013,8(5): 63562.
|
[20] |
CHOW S , YIU S , HUI L . Efficient identity based ring signature[A]. Proc of ACNS 2005[C]. New York,USA, 2005.499-512.
|
[21] |
TSENG Y , HUANG Y , CHANG H . Privacy-preserving multireceiver id-based encryption with provable security[J]. International Journal of Communication Systems of Communication Systems, 2014,27(7): 1034-1050.
|
[22] |
DAVID P , JACQUES S . Security arguments for digital signatures and blind signatures[J]. Journal of Cryptology:The Journal of the Interna-tional Association for Cryptologic Research, 2000,13(3): 361-396.
|