[1] |
ZHENG Y , IMAI H . How to construct efficient signcryption schemes on elliptic curves[J]. Information Processing Letters, 1998,68(5): 227-233.
|
[2] |
MALON-LEE J . Identity-based signcryption[J]. IACR Cryptology ePrint Archive, 2002: 98.
|
[3] |
冯登国, 徐静, 兰晓 . 5G 移动通信网络安全研究[J]. 软件学报, 2018,29(6): 1813-1825.
|
|
FENG D G , XU J , LAN X . Study on 5G mobile communication network security[J]. Journal of Software, 2018,29(6): 1813-1825.
|
[4] |
ZHENG Y , . Digital signcryption or how to achieve cost (signature &encryption) << cost (signature) + cost (encryption)[C]// International Cryptology Conference. Berlin:Springer, 1997: 165-179.
|
[5] |
SHIN J , LEE K , SHIM K ,et al. New DSA-verifiable signcryption schemes[C]// International Conference on Information Security and Cryptology. Berlin:Springer, 2002: 35-47.
|
[6] |
YU H , YANG B . Pairing-free and secure certificateless signcryption scheme[J]. The Computer Journal, 2017,60(8): 1187-1196.
|
[7] |
REZAEIBAGHA F , MU Y , ZHANG S ,et al. Provably secure (broadcast) homomorphic signcryption[J]. International Journal of Foundations of Computer Science, 2019,30(4): 511-529.
|
[8] |
LIBERT B , QUISQUATER J . A new identity based signcryption scheme from pairings[C]// IEEE Information Theory Workshop. Piscataway:IEEE Press, 2003: 155-158.
|
[9] |
WANG H , LIU Z , LIU Z ,et al. Identity-based aggregate signcryption in the standard model from multilinear maps[J]. Frontiers of Computer Science in China, 2016,10(4): 741-754.
|
[10] |
REDDI S , BORRA S . Identity-based signcryption groupkey agreement protocol using bilinear pairing[J]. Informatica (Iithuanian Academy of Sciences), 2017,41(1): 31-37.
|
[11] |
ZHOU C , ZHANG Y , WANG L . A provable secure identity-based generalized proxy signcryption scheme[J]. International Journal of Network Security, 2018,20(6): 1183-1193.
|
[12] |
ZHOU Y , YANG B , ZHANG W ,et al. Provably secure and efficient leakage-resilient certificateless signcryption scheme without bilinear pairing[J]. Discrete Applied Mathematics, 2016,204: 185-202.
|
[13] |
ZHOU C , ZHAO Z , ZHOU W ,et al. Certificateless key-insulated generalized signcryption scheme without bilinear pairings[J]. Security and Communication Networks, 2017,2017: 1-17.
|
[14] |
ISLAM S K , KHAN M K , ALKHOURI A M ,et al. Anonymous and provably secure certificateless multireceiver encryption without bilinear pairing[J]. Security and Communication Networks, 2015,8(13): 2214-2231.
|
[15] |
KARATI A , BISWAS G P . A practical identity based signcryption scheme from bilinear pairing[C]// International Conference on Advances in Computing. Piscataway:IEEE Press, 2016: 832-836.
|
[16] |
GUO H , DENG L . Certificateless ring signcryption scheme from pairings[J]. International Journal of Network Security, 2020,22(1): 102-111.
|
[17] |
HE D , WANG H , WANG L ,et al. Efficient certificateless anonymous multi-receiver encryption scheme for mobile devices[J]. Soft Computing, 2017,21(22): 6801-6810.
|
[18] |
COCKS C , . An identity based encryption scheme based on quadratic residues[C]// IMA International Conference on Cryptography and Coding. Berlin:Springer, 2001: 360-363.
|
[19] |
CLEAR M , HUGHES A , TEWARI H ,et al. Homomorphic encryption with access policies:characterization and new constructions[C]// International Conference on Cryptology in Africa. Berlin:Springer, 2013: 61-87.
|