[1] SHAMIR A. Identity-based cryptosystems and signature schemes [C]//Proceedings of CRYPTO 1984, LNCS 196. Berlin: Springer-Verlag, 1985: 47-53. [2] GENTRY C. Certificate-based encryption and the certificate revocation problem [C]//EUROCRPYT 2003: Proceedings of the 2003 International Conference on the Theory and Applications of Cryptographic Techniques, LNCS 2656. Berlin: Springer-Verlag, 2003: 272-293. [3] KANG B G, PARK J H, HAHN S G. A certificate-based signature scheme [C]//CT-RSA 2004: Proceedings of the Cryptographers' Track at the RSA Conference, LNCS 2964. Berlin: Springer-Verlag, 2004: 99-111. [4] LIU J K, BAO F, ZHOU J. Short and efficient certificate-based signature [C]//NETWORKING 2011 Workshops: Proceedings of the International IFIP TC 6 Workshops, PE-CRN, NC-Pro, WCNS, and SUNSET 2011, Held at NETWORKING 2011, LNCS 6827. Berlin: Springer-Verlag, 2011: 167-178. [5] CHEN J,HUANG Z. Efficient certificate-based signature scheme [J]. Computer Engineering and Applications,2012,48(30):98-102. (陈江山,黄振杰. 一个高效的基于证书签名方案[J].计算机工程与应用, 2012,48(30):98-102.) [6] ASOKAN N, SCHUNTER M, WAIDNER M. Optimistic protocols for fair exchange [C]//CCS '97: Proceedings of the 4th ACM Conference on Computer and Communications Security. New York: ACM, 1997: 7-17. [7] BONEH D, GENTRY C, LYNN B, et al. Aggregate and verifiably encrypted signatures from bilinear maps [C]//EUROCRPYT 2003: Proceedings of the 2003 International Conference on the Theory and Applications of Cryptographic Techniques, LNCS 2656. Berlin: Springer-Verlag, 2003: 416-432. [8] ZHANG L, WU Q, QIN B. Identity-based verifiably encrypted signatures without random oracles [C]//Prov Sec 2009: Proceedings of the Third International Conference on Provable Security, LNCS 5848. Berlin: Springer-Verlag, 2009: 76-89. [9] RVCKRET M, SCHNEIDER M, SCHRODER D. Generic constructions for verifiably encrypted signatures without random oracles or NIZKS [C]//ACNS 2010: Proceedings of the 8th International Conference on Applied Cryptography and Network Security, LNCS 6123. Berlin: Springer-Verlag, 2010: 69-86. [10] LI Y, GAO D, FENG W. Blind and certificateless verifiably encrypted signature scheme [J]. Journal of Computer Applications, 2013,33(12):3519-3521,3535.(李艳红,高德智,冯文文. 盲化的基于无证书的可验证加密签名方案[J]. 计算机应用,2013,33(12):3519-3521, 3535.) [11] SHEN J, WANG J, ZHENG Y, et al. A novel verifiably encrypted signature from Weil pairing [M]//HumanCom and EMC 2013: Advanced Technologies, Embedded and Multimedia for Human-centric Computing, Lecture Notes in Electrical Engineering 260. Berlin: Springer-Verlag, 2014: 603-607. [12] KIM K S, JEONG I R. Efficient verifiably encrypted signatures from lattices [J]. International Journal of Information Security, 2014, 13(4):305-314. [13] SHAO Z. Certificate-based verifiably encrypted signatures from pairings [J]. Information Sciences, 2008, 178(10): 2360-2373. |