[1]ZHENG Y. Signcryption and its application in efficient public key solutions [C]// ISW'97: Proceedings of the First International Workshop on Information Security, LNCS 1396. Berlin: Springer-Verlag, 1997: 291-312.
[2]WANG C-T, CHANG C-C, LIN C-H. Generalization of threshold signature and authenticated encryption for group communication [J]. IEICE Transactions on Fundamentals, 2000, E832A(6): 1228-1237.
[3]HSU C-L, WU T-S, WU T-C. Improvements of generalization of threshold signature and authenticated encryption for group communication [J]. Information Processing Letters, 2002, 81(1): 41-45.
[4]WENG J, YAO G, DENG R H, et al.Cryptanalysis of a certificateless signcryption scheme in the standard model [J]. Information Science, 2011, 181(3): 661-667.
[5]LIU Z, HU Y, ZHANG X, et al.Certificateless signcryption scheme in the standard model [J]. Information Sciences, 2010, 180(3): 452-464.
[6]HE D. Security analysis of a certificateless signcryption scheme [J]. Journal of Software, 2013, 24(3): 618-622. (何德彪.无证书签密机制的安全性分析[J].软件学报,2013,24(3):618-623.)
[7]REN Y, LU H. Provably secure signcryption scheme based on elliptic curve [J]. Computer Engineering, 2011, 37(15): 95-97. (任艳丽,陆海宁.基于椭圆曲线的可证明安全的签密方案[J].计算机工程,2011,37(15):95-97.)
[8]FANG L, SUSILO W, GE C, et al.Hierarchical conditional proxy re-encryption [J]. Computer Standards & Interfaces, 2012, 34(4): 380-389.
[9]ZHANG J, WANG X A. Security analysis of a multi-use identity based CCA-secure proxy re-encryption scheme [C]// Proceedings of the 4th International Conference on Intelligent Networking and Collaborative Systems. Piscataway: IEEE, 2012: 581-586.
[10]LIU W, XU C. Certificateless signcryption scheme without bilinear pairing [J]. Journal of Software, 2011, 22(8): 1918-1926. (刘文浩,许春香.无双线性配对的无证书签密方案[J].软件学报,2011,22(8):1918-1926.)
[11]HUANG B, CHEN Z, ZHU T. Wireless security authentication protocol based on elliptic curve signcryption scheme [J]. Journal of Wuhan University of Technology, 2013, 35(6): 145-150. (黄碧翼,陈泽茂,朱婷婷.基于椭圆曲线签密方案的无线安全认证协议[J].武汉理工大学学报,2013,35(6):145-150.)
[12]PENG C, LI X, LUO W. A generalized group-oriented threshold signcryption schemes [J]. Acta Electronica Sinica, 2007, 35(1): 64-67. (彭长根,李祥,罗文俊.一种面向群组通信的通用门限签密方案[J].电子学报,2007,35(1):64-67.)
[13]WANG Y. Cryptanalysis and improvement of threshold signcryption scheme [J]. Computer Engineering and Applications, 2012, 48(1): 125-127. (王勇兵.一种门限签密方案的分析与改进[J].计算机工程与应用,2012,48(1):125-127.) |