[1] |
CRAMER R, SOUR V.Design and Analysis of Practical Public-key Encryption Schemes Secure Against Adaptive Chosen Ciphertext Attack[J]. Society for Industrial and Applied Mathematics, 2004, 33(1): 167-226.
|
[2] |
DENT A W.Hybrid Signcryption Schemes with Outsider Security[C]//LNCS. 8th International Conference on Information Security, October 1, 2005, Heidelberg , Grmany . Berlin: Springer, 2005: 203-217.
|
[3] |
DENT A W.Hybrid Signcryption Schemes with Insider Security[C]//LNCS. 8th International Conference on Information Security, October 1, 2005, Heidelberg, Germany. Berlin: Springer, 2005: 253-266.
|
[4] |
LIA F, SHIRASE M, TAKAGI T.Certificateless Hybrid Signcryption[C]//LNCS. 9th International Conference on Information Security, October 1, 2009, Heidelberg, Germany. Berlin: Springer, 2009: 112-123.
|
[5] |
LIA F, SHIRASE M, TAKAGI T.Identity-based Hybrid Signcryption[C]//IEEE. 4th International Conference on Availability Reliability and Security, March 16, 2009, Fukuoka, Japan. New York: IEEE, 2009: 534-539.
|
[6] |
YU Huifang, YANG Bo.Provably Secure Certificateless Hybrid Signcryption[J]. Chinese Journal of Computers, 2015, 38(4): 804-813.
|
|
俞惠芳,杨波.可证安全的无证书混合签密[J].计算机学报,2015,38(4):804-813.
|
[7] |
ZHOU Yanwei, YANG Bo, WANG Qinglong.Provably Secure Leakage-resilient Certificateless Hybrid Signcryption Scheme[J]. Journal of software, 2016, 27(11): 2898-2911.
|
|
周彦伟,杨波,王青龙.可证安全的抗泄露无证书混合签密机制[J].软件学报,2016,27(11):2898-2911.
|
[8] |
SUN Yinxia and LI Hui. Efficient Signcryption between TPKC and IDPKC and Its Multi-receiver Construction[J]. Science China Information Sciences, 2010, 53(3): 557-566.
|
[9] |
HUANG Qiong, WONG D S, YANG Guomin.Heterogeneous Signcryption with Key Privacy[J]. The Computer Journal, 2011, 54(4): 525-536.
|
[10] |
LIU Jingwei, ZHANG Lihuan, SUN Rong.Mutual Signcryption Schemes under Heterogeneous Systems[J]. Journal of Electronics & Information Technology, 2016, 38(11): 2948-2953.
|
|
刘景伟,张俐欢,孙蓉.异构系统下的双向签密方案[J]. 电子与信息学报,2016,38(11):2948-2953.
|
[11] |
ZHANG Yulei, WANG Huan, LIU Wenjing, et al.Security Analysis and Improvement of Matual Signcryption Schemes under Heterogeneous Systems[J]. Journal of Electronics & Information Technology, 2017, 39(12): 3045-3050.
|
|
张玉磊,王欢,刘文静,等.异构双向签密方案的安全性分析和改进[J]. 电子与信息学报,2017,39(12):3045-3050.
|
[12] |
LI F, HAN Y, JIN C.Practical Signcryption for Secure Communication of Wireless Sensor Networks[J]. Wireless Personal Communications, 2016, 89(4): 1391-1412.
|
[13] |
LI F, ZHENG Z, JIN C.Secure and Efficient Data Transmission in the Internet of Things[J]. Telecommunication Systems, 2016, 62(1): 111-122.
|
[14] |
ZHANG Yulei, WANG Huan, MA Yanli, et al.Provable and Secure Traditional Public Key Infrastructure-certificateless Public Key Heterogeneous Aggregate Signcryption Scheme[J]. Journal of Electronics & Information Technology, 2018, 40(5): 1079-1086.
|
|
张玉磊,王欢,马彦丽,等.可证安全的传统公钥密码-无证书公钥密码异构聚合签密方案[J].电子与信息学报,2018,40(5):1079-1086.
|
[15] |
DAVID P, JACQUES S .Security Arguments for Digital Signatures and Blind Signatures[J]. Journal of Cryptology, 2000, 13(3): 361-396.
|
[16] |
DING Chao, Research Status and Development Trend of 5G Network Technology[J]. Digital Communication World, 2018(4): 131-132.
|
|
丁超. 5G网络技术研究现状和发展趋势[J].数字通信世界,2018,(4):131-132.
|
[17] |
FENG Dengguo, XU Jing, LAN Xiao.Study on 5G Mobile Communication Network Security[J]. Journal of Software, 2018, 29(6): 1813-1825.
|
|
冯登国,徐静,兰晓. 5G移动通信网络安全研究[J].软件学报,2018,29(6):1813-1825.
|
[18] |
WANG Caifen, LIU Chao, LI Yahong.Two-way and Anonymous Heterogeneous Signcryption Scheme between PKI and IBC[J]. Journal on Communications, 2017, 38(10): 10-17.
|
|
王彩芬,刘超,李亚红.基于PKI 和 IBC 的双向匿名异构签密方案[J].通信学报,2017,38(10):10-17.
|
[19] |
LI Chenyi, ZHANG Yulei, ZHANG Yongjie, et al.Efficient TPKC→IDPKC Heterogeneous Signcryption Scheme[J]. Computer Engineering and Applications, 2018, 54(2): 125-130.
|
|
李臣意,张玉磊,张永洁,等.高效的TPKC→IDPKC的异构签密方案[J].计算机工程与应用,2018,54(2):125-130.
|
[20] |
WANG Zhen, MA Zhaofeng, LUO Shoushan.Identity-based Efficient Authentication and Key Agreement Protocol for Mobile Internet[J]. Journal on Communications, 2017, 38(8): 19-27.
|
|
王真,马兆丰,罗守山.基于身份的移动互联网高效认证密钥协商协议[J].通信学报,2017,38(8):19-27.
|