[1]Zheng Yuliang.Digital signcryption or how to achieve cost(signature &encryption) << cost(signature)+cost(encryption)[C] ∥Proc of Crypto,1997:165179.
[2]Gamage C,Leiwo J,Zheng Y L.Encrypted message authentication by firewalls[C] ∥Proc of Public Key Cryptography,1999:6981.
[3]Baek J,Steinfeld R,Zheng Yuliang.Formal proofs for the security of signcryption[C] ∥Proc of the 5th International Workshop on Practice and Theory in Public Key Cryptosystems,2002:8198.
[4]An J H,Dodis Y,Rabin T.On the security of joint signature and encryption[C] ∥Proc of EuroCrypt’2002,2002:83107.
[5]MaloneLee J.Identitybased signcryption[EB/OL].[20130614].http:∥eprint.iacr.org/2002/098.pdf.
[6]Barbosa M, Farshim P. Certificateless signcryption [C] ∥Proc of the 2008 ACM Symposium on Information,Computer and Communications Security,2008:369372.
[7]Zhou Caixue. Improved certificateless hybrid signcryption scheme[J].Application Research of Computers,2013,30(1):273277.(in Chinese)
[8]Han Yiliang,Yang Xiaoyuan.New ECDSAverifiable generalized signcryption[J].Chinese Journal of Computers,2006,29(11):20032012.(in Chinese)
[9]Gamage C,Leiwo J,Zheng Y L.An efficient scheme for secure message transmission using proxysigncryption[C]∥Proc of the 22nd Australasian Computer Science Conference,1999:420431.
[10]Zhang Mingwu, Yang Bo, Zhang Wenzheng. Short signcryption scheme with forward security and ciphertext anonymity[J].Journal of Beijing University of Posts and Telecommunications,2010,33(4):131134.(in Chinese)
[11]Liu Zhiyuan.Secure certificateless signcryption scheme[J].Application Research of Computers,2013,30(5):15331535.(in Chinese)
[12]He Long,Peng Xinguang.Safe and efficient remote attestation protocol based on bilinear pairings signcryption[J].
Journal of Computer Applications, 2013, 33(10):28542857.(in Chinese)
[13]Qi Mingping, Chen Jianhua, He Debiao. Sincryption scheme with public verifiability and forward security[J].Application Research of Computers,2014,31(10):30933094.(in Chinese)
[14]Yu Huifang, Yang Bo.Provably secure certificateless hybrid signcryption[J].Chinese Journal of Computers,2015,38(4):804813.(in Chinese)
[15]Gao Jianxin,Wu Xiaoping,Qin Yanlin,et al.Secure certificateless signcryption scheme without bilinear pairing[J].Application Research of Computers,2014,31(4):11951198.(in Chinese)
[16]Zhou Xuanwu, Jin Zhigang, Fu Yan,et al.Efficient short signcryption from pairings in Internet of Things[J].Journal of System Simulation,2014,26(7):15661569.(in Chinese)
[17]Pointcheval D,Stern J.Security arguments for digital signatures and blind signatures[J].Journal of Cryptology,2000,13(3):361396.
附中文参考文献:
[7]周才学.改进的无证书混合签密方案[J].计算机应用研究,2013,30(1):273277.
[8]韩益亮,杨晓元.ECDSA可公开验证广义签密[J].计算机学报,2006,29(11):20032012.
[10]张明武,杨波,张文政.密文匿名的高效前向安全短签密方案[J].北京邮电大学学报,2010,33(4):131134.
[11]刘志远.一个安全的无证书签密方案[J].计算机应用研究,2013,30(5):15331535.
[12]何龙,彭新光.基于双线性对签密的安全高效远程证明协议[J].计算机应用,2013,33(10):28542857.
[13]戚明平,陈建华,何德彪.具有前向安全性的可公开验证的签密方案[J].计算机应用研究,2014,31(10):30933094.
[14]俞惠芳,杨波.可证安全的无证书混合签密[J].计算机学报,2015,38(4):804813.
[15]高键鑫,吴晓平,秦艳琳,等.无双线性对的无证书安全签密方案[J].计算机应用研究,2014,31(4):11951198.
[16]周宣武,金志刚,付燕,等.适用于物联网环境的椭圆曲线短签密方案[J].系统仿真学报,2014,26(7):15661569.