[1]ZHENG Y L. Digital signcryption or how to achieve cost (signature & encryption) <〖KG-*3〗<cost (signature) + cost(encryption)[C]// Crypto 1997. Berlin:Springer-Verlag, 1997: 165-179.[2]张串绒, 肖国镇. 一个可公开验证签密方案的密码分析和改进[J].电子学报,2006,34(1): 177-199.[3]CHIBA D, MATSUDA T, SCHULDT J C N, et al. Efficient generic constructions of signcryption with insider security in the multi-user setting[C]// ACNS'11: Proceedings of the 9th International Conference on Applied Cryptography and Network Security, LNCS 6715, Berlin: Springer-Verlag, 2011:220-237.[4]HWANG S J, SUNG Y H. Confidential denialble authentication using promised signcryption[J]. The Journal of Systems and Software, 2011, 84(10): 1652-1659.[5]LI FAGEN, KHAN M K, ALGHATHBAR K, et al. Identity-based online/offline signcryption for low power devices[J]. Journal of Network and Computer Applications, 2012,35(1):340-347.[6]ATENIESE G, FU K, GREEN M, et al. Improved proxy re-encryption schemes with applications to secure distributed storage[J]. ACM Transactions on Information and System Security, 2006, 9(1): 1-30.[7]REN Y L, GU D W, WANG S Z, et al. Hierarchical identity-based proxy re-encryption without random oracles[J]. International Journal of Foundations of Computer Science, 2010,21(6):1049-1063.[8]SHAO J, CAO Z F, LIANG X H, et al. Proxy re-encryption with keyword search[J]. Information Sciences, 2010,180(13): 2576-2587.[9]FANG L M, SUSILO W, GE C P, et al. Interactive conditional proxy re-encryption with fine grain policy[J]. The Journal of Systems and Software, 2011, 84(12): 2293-2303.[10]WENG J, ZHAO Y L. Direct constructions of bidirectional proxy re-encryption with alleviated trust in proxy[EB/OL]. [2012-10-01]. http://eprint.iacr.org/2011/208.[11]CHANDRASEKAR S, AMBIKA K, RANGAN C P. Signcryption with proxy re-encryption cryptoloagy[EB/OL]. [2012-10-01].http://eprint.archive.report/2008/276. [12]SMITH T. DVD Jon: buy DRM-less tracks from Apple iTunes[EB/OL]. [2012-10-01].http://www.theregister.co.uk/2005/03/18/itunes_pymusique. [13]KIRTANE V, RANGAN C P. RSA-TBOS signcryption with proxy re-encryption cryptoloagy[EB/OL]. [2012-10-01].http://eprint.archive.report/2008/324.[14]BONEH D, BOYEN X, GOH E-J. Hierarchical identity based encryption with constant size ciphertext[C]// Eurocrypt’05: Advances in Cryptology, LNCS3494. Berlin: Springer-Verlag, 2005: 440-456.[15]POINTCHEVAL D, STERN J. Security arguments for digital signatures and blind signatures[J]. Journal of Cryptology, 2000,13(3): 361-369.[16]BONEH D, FRANKLIN M. Identity-based encryption from the Weil pairing[J]. SIAM Journal of Computing, 2003,32(3): 586-615. |