[1]Zheng Yuliang. Digital signcryption or how to achieve cost(signature & encryption)cost(signature)+cost(encryption)[C]∥Proc of Cryptology,CRYPYO’97, 1997:165179.
[2]Geng Li, Wang Shangping, Zhou Feng, et al. A new IDbased signcryption scheme[J].Computer Engineering, 2004,30(19):5254.(in Chinese)
[3]Bao Feng,Deng R H.A signcryption scheme with signature directly verifiable by public key [C]∥Proc of Cryptography,PKC’98, 1998:5559.
[4]Yum D H,Lee P J.New signcryption schemes based on KCDSA[C]∥Proc of ICISC’01, 2001:305317.
[5]Girault M. Selfcertified public keys[C]∥Proc of Advances in CryptologyEUROCRYPT’91,1991:491497.
[6]Yu Huifang, Wang Caifen. An efficient selfcertified signcryption scheme[J]. Computer Engineering, 2009,35(16):138142.(in Chinese)
[7]Wang Zhicang,Yu Huifang.Selfcertified signcryption scheme based on discrete logarithm problem[J]. Computer Applications and Software, 2010,27(10):223225.(in Chinese)
附中文参考文献:
[2]耿莉,王尚平,周峰等.一种新的基于身份的签密方案[J].计算机工程,2004,30(19):5254.
[6]俞慧芳, 王彩芬.一个高效的自认证签密方案[J].计算机工程, 2009,35(16):138142.
[7]王之仓,俞慧芳. 基于离散对数问题的自认证签密方案[J].计算机应用与软件,2010,27(10):223225. |