[1]ZHENG Y L. Digital signcryption or how to achieve cost (signature & encryption) <〖KG-*3〗< cost(signature)+cost(encryption) [C]// Proceedings of the CRYPTO'97, LNCS 1294. Heidelberg: Springer-Verlag, 1997:165-179. [2]BARBOSA M, FARSHIM P. Certificateless signcryption[C]// ASIACCS 2008: Proceedings of the ACM Symposium on Information, Computer and Communications Security. New York: ACM, 2008:369-372. [3]LIU Z, HU Y, ZHANG X, et al. Certificateless signcryption scheme in the standard model [J]. Information Sciences, 2010, 180(3): 452-464.[4]LI F, KHAN M K. A survey of identity-based signcryption [J]. IETE Technical Review, 2011, 28(3): 265-272.[5]王彩芬,王筱娟,郝占军.基于身份的新签密方案[J].计算机应用研究, 2010,27(12):4630-4632, 4637.[6]李志敏,徐馨,李存华. 基于身份的公开验证签密方案[J].计算机应用, 2012, 32(1):99-103.[7]DENT A W. Hybrid signcryption schemes with outsider security [C]// ISC 2005:Proceedings of the 8th International Conference on Information Security. LNCS 3650.Berlin: Springer-Verlag, 2005: 203-217. [8]LI F, SHIRASE M, TAKAGI T. Identity-based hybrid signcryption [C]// ARES 2009: Proceedings of the Fourth International Conference on Availability, Reliability and Security. Washington, DC: IEEE Computer Society, 2009:534-539.[9]LI F G, SHIRASE M, TAKAGI T. Certificateless hybridsigncryption [C]// ISPEC 2009:Proceedings of the 5th Information Security Practice and Experience Conference, LNCS 5451. Berlin: Springer-Verlag, 2008: 112-123.[10]SELVI S S D, VIVEK S S, RANGAN C P. Certificateless KEM and hybrid signcryption schemes revisited [C]// ISPEC 2010: Proceedings of the 6th Information Security Practice and Experience, LNCS 6047.Berlin: Springer-Verlag, 2010: 294-307.[11]孙银霞,李晖.高效无证书混合签密[J].软件学报,2011,22(7): 1690-1698.[12]金春花,李学俊,魏鹏娟,等.新的无证书混合签密[J].计算机应用研究,2011,28(9):3527-3531.[13]SINGH K. Identity based hybrid signcryption revisited [C]// ICITeS 2012: Proceedings of the 2012 International Conference on Information Technology and e-Services. Washington, DC: IEEE Computer Society, 2012:34-39.[14]CAO X, KOU W, DANG L, et al. IMBAS: identity-based multi-user broadcast authentication in wireless sensor networks [J]. Computer Communications, 2008, 31(4/5): 659-671.[15]Crossbow technology incorporation. MICA2 datasheet [EB/OL]. [2012-11-01].http://www.xbow.com/Products/Product_pdf_files/Wireless_pdf/MICA2_Datasheet.pdf/.[16]IEEE. 2.4GHz IEEE 802.15.4/ZigBee-ready RF transceiver [EB/OL]. [2012-11-01]. http://focus.ti.com/lit/ds/symlink/cc2420.pdf/.[17]GURA N, PATEL A, WANDER A. Comparing elliptic curve cryptography and RSA on 8-bit CPUs [C]// CHES'04:Proceedings of the Cryptographic Hardware and Embedded Systems. Heidelberg: Springer-Verlag, 2004:119-132.[18]YASMIN R, RITTER E, WANG G. A pairing-free ID-based one-pass authenticated key establishment protocol for wireless sensor networks [C]// SENSORCOMM 2011: Proceedings of the Fifth International Conference on Sensor Technologies and Applications. Nice, France: IARIA, 2011:340-347.[19]ISLAM S H, BISWAS G P. A more efficient and secure ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem [J]. The Journal of Systems and Software, 2011, 84(11):1892-1898.[20]BONEH D, LYNN B, SHACHAM H. Short signatures from the Weil pairing [J]. Journal of Cryptology,2004,17(4):297-319. |