[1] |
ZHENG Y , . Digital signcryption or how to achieve cost (signature &encryption) <<cost (signature) + cost (encryption)[C]// Annual International Cryptology Conference. Berlin:Springer, 1997: 165-179.
|
[2] |
ZHENG Y , IMAI H . How to construct efficient signcryption schemes on elliptic curves[J]. Information Processing Letters, 1998,68(5): 227-233.
|
[3] |
STEINFELD R , ZHENG Y . A signcryption scheme based on integer factorization[C]// International Workshop on Information Security. Berlin:Springer, 2000: 308-322.
|
[4] |
MICCIANCIO D . Lattice-based cryptography[J]. Encyclopedia of Cryptography and Security, 2011: 713-715.
|
[5] |
LYUBASHEVSKY V , PEIKERT C , REGEV O . On ideal lattices and learning with errors over rings[J]. Journal of the ACM, 2013,60(6):43.
|
[6] |
LYUBASHEVSKY V , . Lattice signatures without trapdoors[C]// Annual International Conference on the Theory and Applications of Cryptographic Techniques. Berlin:Springer, 2012: 738-755.
|
[7] |
AKLEYLEK S , BINDEL N , BUCHMANN J ,et al. An efficient lattice-based signature scheme with provably secure instantiation[C]// International Conference on Cryptology in Africa. Berlin:Springer, 2016: 44-60.
|
[8] |
WANG F , HU Y , WANG C . Post-quantum secure hybrid signcryptionfrom lattice assumption[J]. Applied Mathematics & Information Sciences, 2012,6(1): 23-28.
|
[9] |
FAGEN L , FAHAD T , BIN M ,et al. Lattice-based signcryption[J]. Concurrency and Computation:Practice and Experience, 2013,25(14): 2112-2122.
|
[10] |
YAN J , WANG L , WANG L ,et al. Efficient lattice-based signcryption in standard model[J]. Mathematical Problems in Engineering, 2013,2013: 1-18.
|
[11] |
LU X , WEN Q , JIN Z ,et al. A lattice-based signcryption scheme without random oracles[J]. Frontiers of Computer Science, 2014,8(4): 667-675.
|
[12] |
BAI S , GALBRAITH S D . An improved compression technique for signatures based on learning with errors[C]// Cryptographers’ Track at the RSA Conference. Berlin:Springer, 2014: 28-47.
|
[13] |
LU X , WEN Q , WANG L ,et al. A lattice-based signcryption scheme without trapdoors[J]. Journal of Electronics and Information, 2016,38(9): 2287-2293.
|
[14] |
GERARD F , MERCKX K . Setla:signature and encryption from lattices[C]// International Conference on Cryptology and Network Security. Berlin:Springer, 2018: 299-320.
|
[15] |
ALKIM E , DUCAS L , P?PPELMANN T .et al Post-quantum keyexchange-a new hope[C]// 25th USENIX Security Symposium (USENIX Security 2016). Berkeley:USENIX Association, 2016: 327-343.
|
[16] |
SATO S , SHIKATA J . Lattice-based signcryption without random oracles[C]// International Conference on Post-Quantum Cryptography(PQCrypto2018). Berlin:Springer, 2018: 331-351.
|
[17] |
LIU Z Y , TSO R , TSENG Y F ,et al. Signcryption from NTRU lattices without random oracles[C]// 14th Asia Joint Conference on Information Security (AsiaJCIS2019). Piscataway:IEEE Press, 2019: 134-141.
|
[18] |
DEL P R , LYUBASHEVSKY V , POINTCHEVAL D . The whole is less than the sum of its parts:constructing more efficient lattice-based AKEs[C]// International Conference on Security and Cryptography for Networks. Berlin:Springer, 2016: 273-291.
|
[19] |
ZHANG Y H , HU Y , XIE J ,et al. Efficient ring signature schemes over NTRU lattices[J]. Security and Communication Networks, 2016,9(18): 5252-5261.
|
[20] |
YANG X , CAO H , LI W ,et al. Improved lattice-based signcryption in the standard model[J]. IEEE Access, 2019,7: 155552-155562.
|
[21] |
LIU Z , HAN Y L , YANG X Y . A signcryption scheme based learning with errors over rings without trapdoor[C]// National Conference of Theoretical Computer Science. Berlin:Springer, 2019: 168-180.
|
[22] |
FUJISAKI E , OKAMOTO T . Secure integration of asymmetric and symmetric encryption schemes[J]. Journal of Cryptology, 2013,26(1): 80-101.
|
[23] |
APPLEBAUM B , CASH D , PEIKERT C ,et al. Fast cryptographic primitives and circular-secure encryption based on hard learning problems[C]// Annual International Cryptology Conference. Berlin:Springer, 2009: 595-618.
|
[24] |
HUANG Q , WONG D S , ZHAO Y . Generic transformation to strongly unforgeable signatures[C]// International Conference on Applied Cryptography and Network Security. Berlin:Springer, 2007: 1-17.
|
[25] |
AN J H , DODIS Y , RABIN T . On the security of joint signature and encryption[C]// In Proceedings Advances inCryptology-EUROCRYPT 2002,LNCS 2332. Berlin:Springer, 2002: 83-107.
|
[26] |
NANDI M , PANDIT T . Generic conversions from CPA to CCA secure functional encryption[J]. IACR Cryptology ePrint Archive,2015, 2015:457.
|
[27] |
LYUBASHEVSKY V , MICCIANCIO D . Asymptotically efficient lattice-based digital signatures[C]// Theory of Cryptography Conference. Berlin:Springer, 2008: 37-54.
|