[1]Shamir A. Identitybased cryptosystems and signature schemes[C]∥Proc of CRYPTO’84, 1984:4753.
[2]Zheng Y L. Digital signcryption or how to achive cost (signature & encryption)《cost (signature)+cost(encryption)》[C]∥Proc of CRYPTO’97, 1997:165179.
[3]Baek J, Steinfeld R, Zheng R. Formal proofs for the security of signcryption[J]. Journal of Cryptology,2007,20(2):203235.
[4]MaloneLee J. Identitybased signcryption[EB/OL].[20090122].http://eprint.Iacr. Org/ 2002/098.
[5]Libert B, Quisquater J J. A new identity based signcryption scheme from pairings[C]∥Proc of the IEEE Information Theory Workshop, 2003:155168.
[6]Chow S S M, Yiu S M, Hui L C K, et al. Efficient forward and provably secure IDbased signcryption scheme with public verifiability and public ciphertext authenticity[C]∥Proc of Information Security and Cryptology, 2004:352369.
[7]Boyen X. Multipurpose identitybased signcryption:A swiss army knife for identitybased cryptography[C]∥Proc of CRYPTO’03, 2003:383399.
[8]Barreto P S L M, Libert B, McCullagh N, et al. Efficient and provablysecure identitybased signatures and signcryption from bilinear maps[C]∥Proc of ASIACRYPT’05,2005:515532.
[9]Lal S, Kushwah P. IDbased generalized signcryption[R]. Report 2008/084 Cryptology Eprint Archive,2008.
[10]Yu G, Ma X, Shen Y, et al. Provable secure identity based generalized signcryption scheme[J] Theoretical Computer Science, 2010,411(4042):36143624.
[11]Chen L, Malone J L. Improved identitybased signcryption[C]∥Proc of 2005 Public Key Cryptography 2005, 2005:362379.
[12]Li Fagen, Hu Yupu, Li Gang. An efficient identity based signcryption scheme[J]. Chinese Journal of Computers, 2006, 29(9):16411647.(in Chinese)
[13]Li Xiao, He Mingxing, Luo Dawen. IDbased signcryption scheme[J]. Computer Engineering, 2009, 35(22):144146.(in Chinese)
[14]Li Shun, Zeng Chao, Li Jun. Identitybased signcryption scheme[J]. Computer Engineering, 2010, 36(8):135137.(in Chinese)
[15]Jin Z P, Wen Q Y, Du H Z. An improved semanticallysecure identitybased signcryption scheme in the standard model[J]. Computers and Electrical Engineering,2010,36(3):545552.
附中文参考文献:
[12]李发根,胡予濮,李 刚. 一个高效的基于身份的签密方案[J].计算机学报, 2006, 29(9):16411647.
[13]李虓,何明星,罗大文. 基于身份的签密方案[J]. 计算机工程,2009, 35(22):144146.
[14]李顺,曾超,李军. 一种基于身份的签密方案[J]. 计算机工程, 2010, 36(8):135137. |