[1] |
ZHENG Y , . Digital signcryption or how to achieve(signature&encryption)<<cost(signature)+cost(encryption)[C]// The Crypto’97. 1997: 291-312.
|
[2] |
DUAN S , CAO Z . Efficient and provably secure multi receiver identity based signcryption[C]// The 11th Australasian Conf on Information Security and Privacy (ACISP 2006). LNCS 4058,Heidelberg:Springer-Verlag, 2006: 195-206.
|
[3] |
庞辽军, 李慧贤, 崔静静 ,等. 公平的基于身份的多接收者匿名签密设计与分析[J]. 软件学报, 2014,25(10): 2409-2420. PANG L J , LI H X , CUI J J ,et al. Design and analysis of a fair ID based multi-receiver anonymous signcryption[J]. Journal of Software, 2014,25(10): 2409-2420.
|
[4] |
ZHANG M W , YANG B , TSUYOSHI T . Reconciling and improving of multi-receiver signcryption protocols with threshold decryption[J]. Security and Communication Networks, 2012,5: 1430-1440.
|
[5] |
MING Y , ZHAO X M , WANG Y M . Multi-receiver identity-based signcryption scheme in the standard model[C]// ICICA 2011,LNCS 7030,Springer-Verlag. Berlin Heidelberg, 2011: 487-494.
|
[6] |
INTAE K , SEONG O H . Efficient identity-based broadcast signcryption schemes[J]. Security and Communication Networks, 2014,7(1): 914-925.
|
[7] |
ZHANG J , TANG W.On the security of Kim et al . two ID-based broadcast signcryption schemes[J]. Security and Communication Networks, 2015,8(8): 1509-1514.
|
[8] |
ZHANG B , XU QL . An ID-based anonymous signcryption scheme for multiple receivers secure in the standard model[C]// The AST/UCMA/ISA/ACN 2010 Conf.on Advances in Computer Science and Information Technology(AST/UCMA/ISA/ACN2010).LNCS 6059. Heidelberg:Springer-Verlag, 2010: 15-27.
|
[9] |
NAKANO R , SHIKATA J J . Constructions of signcryption in the multi-user setting from identity-based encryption[C]// IMACC 2013,LNCS 8308. 2013: 324-343.
|
[10] |
AHMED F , MASOOD D A , KAUSAR F . An efficient multi recipient signcryption scheme offering non repudiation[C]// 2010 10th IEEE International Conference on Computer and Information Technology. 2010: 1577-1581.
|
[11] |
ALRIYAMI S , PATERSON K . Certificateless public key cryptography[C]// ASIACRYPT 2003. 2003: 452-473.
|
[12] |
李慧贤, 陈绪宝, 庞辽军 ,等. 基于多变量公钥密码体制的无证书多接收者签密体制[J]. 计算机学报, 2012,35(9): 1881-1889. LI H X , CHEN X B , PANG L J ,et al. Certificateless multi receiver signcryption scheme based on multivariate public key cryptography[J]. Chinese Journal of Computers, 2012,35(9): 1881-1889.
|
[13] |
朱辉, 李晖, 王育民 . 不使用双线性对的无证书签密方案[J]. 计算机研究与发展, 2010,47(9): 1587-1594. ZHU H , LI H , WANG Y M . Certificateless signcryption scheme without pairing[J]. Journal of Computer Research and Development, 2010,47(9): 1587-1594.
|
[14] |
刘文浩, 许春香 . 无双线性配对的无证书签密机制[J]. 软件学报, 2011,22(8): 1918-1926. LIU W H , XU C X . Certificateless signcryption scheme without bilinear pairing[J]. Journal of Software, 2011,22(8): 1918-1926.
|
[15] |
何德彪 . 无证书签密机制的安全性分析[J]. 软件学报, 2013,24(3): 618-622. HE D B . Security analysis of a certificateless signcryption scheme[J]. Journal of Software, 2013,24(3): 618-622.
|
[16] |
MIRACL. Multiprecision integer and rational arithmetic C/C++library[EB/OL]. , 2004.
|
[17] |
CHEN L , CHENG Z , SMART N P . Identity-based key agreement protocols from pairings[J]. Int’l Journal of Information Security, 2007,6(4): 213-241.
|