[1] |
ZHENG Yuliang.Digital Signcryption or How to Achieve Cost(Signature & Encryption)<<Cost(Signature)+Cost (Encryption)[C]//Springer. In Proceedings of the Cryptology-Crypto,May 17, 2006,Santa Barbara, California. Berlin:Springer, 1997:165-179.
|
[2] |
ZHANG Yongqiang, LU Weilong, TANG Chunming, et al.Research on An Efficient and Practical Cloud-based Digital Signature Scheme[J]. Netinfo Security,2016,16(7):1-6.
|
|
张永强,卢伟龙,唐春明,等. 一种高效实用的基于云服务的数字签名方案研究[J]. 信息网络安全,2016,16(7):1-6.
|
[3] |
DIFFIE W, HELLMAN M.New Directions in Cryptography[J]. IEEE Transactions on Information Theory, 1976, 22(6):644-654.
|
[4] |
LI Fagen, ZHONG Di.A Survey of Digital Signcryption[J].Netinfo Security,2011,11(12):1-8.
|
|
李发根,钟笛. 数字签密综述[J]. 信息网络安全,2011,11(12):1-8.
|
[5] |
AL-RIYAMI S, PATERSON K G.Certificateless Public Key Cryptography[J]. Asiacrypt , 2003 , 2894(2) :452-473.
|
[6] |
BARBOSA M, FARSHIM P.Certificateless Signcryption[C]//ACM. Computer and Communications Security,March 18-20, 2008, Tokyo, Japan.New York:ACM, 2008:369-372.
|
[7] |
WU Chenhuang, CHEN Zhixiong.A New Efficient Certificateless Signcryption Scheme[C]//IEEE. 2008 International Symposium on Information Science and Engineering, December 20-22, 2008, Shanghai, China. New York:IEEE, 2008:661-664.
|
[8] |
DU Qingling.Identity-based Dynamic Group Communication Signcryption Scheme[J]. Netinfo Security,2017,17(9):42-44.
|
|
杜庆灵. 基于身份的动态群通信签密方案[J]. 信息网络安全,2017,17(9):42-44.
|
[9] |
SUN Yinxia, HUI Li.Efficient Signcryption between TPKC and IDPKC and its Multi-receiver Construction[J]. Science China(Information Sciences),2010,53(3):557-566.
|
[10] |
HUANG Q, WONG D S, Yang G, et al.Heterogeneous Signcryption with Key Privacy[J]. Computer Journal, 2011,54(4):525-536.
|
[11] |
WANG Caifen, LI Yahong, ZHANG Yulei, et al.Efficient Heterogeneous Signcryption Scheme in the Standard Model[J]. Journal of Electronics & Information Technology,2017,39(4):881-886.
|
|
王彩芬,李亚红,张玉磊,等. 标准模型下高效的异构签密方案[J]. 电子与信息学报,2017,39(4):881-886.
|
[12] |
ZHANG Yulei, WANG Huan, LIU Wenjing, et al.Security Analysis and Improvement of Mutual Signcryption Schemes under Heterogeneous Systems[J]. Journal of Electronics & Information Technology,2017,39(12):3045-3050.
|
|
张玉磊,王欢,刘文静,等. 异构双向签密方案的安全性分析和改进[J]. 电子与信息学报,2017,39(12):3045-3050.
|
[13] |
ZHANG Yulei, ZHANG Linggang, WANG Caifen, et al.Provable Secure IDPKC-to-CLPKC Heterogeneous Signcryption Scheme[J].Journal of Electronics & Information Technology,2017,39(9):2127-2133.
|
|
张玉磊,张灵刚,王彩芬,等. 可证安全的IDPKC-to-CLPKC异构签密方案[J]. 电子与信息学报,2017,39(9):2127-2133.
|
[14] |
LIU Jingwei, ZHANG Lihuan, SUN Rong, et al.Mutual Heterogeneous Signcryption Schemes for 5G Network Slicings[J]. IEEE Access,2018,6(4):7854-7863.
|
[15] |
LIU Zheli, WENG Jian, LI Jin, et al.Cloud-based Electronic Health Record System Supporting Fuzzy Keyword Search[J]. Soft Computing,2016,20(8):1-13.
|
[16] |
ISLAM S H, LI Fagen.Leakage-Free and Provably Secure Certificateless Signcryption Scheme Using Bilinear Pairings[J]. Computer Journal,2015,58(10):2636-2648.
|
[17] |
LIN Xijun, SUN Lin, QU Haipeng, et al.Editorial: On the Security of the First Leakage-Free Certificateless Signcryption Scheme[J]. Computer Journal,2016,60(4):491-496.
|