[1]MAMBO M, USUDA K, OKAMOTO E . Proxy signatures for delegating signing operation [C]// Proceedings of the 3rd ACM Conference on Communications Security. New York: ACM, 1996:48-57.
[2]BODYREVA A, PALACIO A, WARINSCHI B. Security proxy signature schemes for delegation of signing rights[EB/OL]. [2014-4-10]. http://eprint.iacr.org/2003/096.pdf.[3]SUN Y, XU C, YU Y, et al.Strongly unforgeable proxy signature scheme secure in the standard model [J]. Journal of Systems and Software, 2011,84(9):1471-1479.
[4]OKAMOTO T, INOMATA A, OKAMOTO E. A proposal of short proxy signature using pairing [C]// Proceedings of the International Conference on Information Technology: Coding and Computing. Piscataway: IEEE Press, 2005:631-635.
[5]LU R, CAO Z, DONG X, et al.Designated verifier proxy signature scheme from bilinear pairings [C]// Proceedings of the 1st International Multi-Symposiums on Computer and Computational Sciences. Piscataway: IEEE Press, 2006:40-47.
[6]HUANG X Y, MU Y, SUSILO W, et al.Short designated verifier proxy signature from pairings [C]// Proceedings of the 2005 Embedded Ubiquitous Computing-EUC 2005 Workshops. Berlin: Springer-Verlag, 2005:835-844.
[7]SHAMIR A. Identity-based cryptosystems and signature schemes [C]// Proceedings of CRYPTO 84—Advances in Cryptology. Berlin: Springer-Verlag, 1984:47-53.
[8]BONEH D, RANKLIN M. Identity-based encryption from the Weil pairing [C]// Proceedings of the 21st Annual International Confereence—Advances in Cryptology. Berlin: Springer-Verlag, 2001:213-229.
[9]ZHENG Y. Digital signcryption or how to achieve cost(signature&encryption)<〖KG-*3〗<cost(signature)+cost(encryption) [C]// Proceedings of the 17th Annual International Cryptology Confereence—Advances in Cryptology. Berlin: Springer-Verlag, 1997:165-179.
[10]BEAK J, STEINFELD R, ZHENG Y. Formal proofs for the security of signcryption [C]// Proceedings of the 5th International Workshop on Practice and Theory in Public Key Cryptosystems. Berlin: Springer-Verlag, 2002:81-98.
[11]MALONE-LEE J. Identity-based signcryption [EB/OL]. [2014-03-25]. http://eprint.iacr. org/2002/098.pdf.
[12]YU Y, YANG B, SUN Y, et al.Identity based signcryption scheme without random oracles [J]. Computer Standards and Interfaces, 2009,31(1):56-62.
[13]ZHANG B. Cryptanalysis of an identity based signcryption scheme without random oracles [J]. Journal of Computational Information Systems, 2010,6(6):1923-1931.
[14]JIN Z, W Q Y, DU H Z. An improved semantically-secure identity-based signcryption scheme in the standard model [J]. Computer & Electrical Engineering, 2010,36(3):545-552.
[15]LI F, LIAO Y, QIN Z. Analysis of an identity-based signcryption scheme in the standard model [J]. IEICE Transactions on Fundamental of Electrinics, Communications and Computer Science, 2011,94(1):268-269.
[16]LI F, KHURRAM KHAN M, ALGHATHBAR K, et al.Identity-based online/offline signcryption for low power devices [J]. Journal of Network and Computer Applications, 2012,35(1):340-347.
[17]LI F, TKGI T. Secure identity-based singcryption in standard model [J]. Mathematical and Computer Modelling, 2013,57(11):2685-2694.
[18]GAMAGE C, LEIWO J, ZHENG Y. An efficient scheme for secure message transmission using proxy-signcryption [C]// Proceedings of the 22nd Australasian Computer Science Conference. Berlin: Springer-Verlag, 1999:18-21.
[19]LI X, CHEN K. Identity-based proxy-signcryption scheme from pairing [C]// Proceedings of the 2004 IEEE International Conference on Services Computing. Washington, DC: IEEE Computer Society, 2004:494-497.
[20]WANG Q, CAO Z. Efficient ID-based proxy signature and proxy signcryption from bilinear pairings [C]// Proceedings of the 2005 International Conference on Computational Intelligence and Security. Berlin: Springer-Verlag, 2005:167-172.
[21]WANG M, LI H, LIU Z. Efficient identity based proxy-signcryption schemes with forward security and public verifiability [C]// Proceedings of the 3rd International Conference on Networking and Mobile Computing. Berlin: Springer-Verlag, 2005:982-991.
[22]SWAPNA G, GOPAL P V S S N, GOWRI T, et al.An efficient Identity-based proxy signcryption scheme [J]. International Journal of Information and Network Security, 2012,1(3): 200-206.
[23]GU K, JIA W, JIANG C. Efficient identity-based proxy signature in the standard model [J]. The Computer Journal, 2013:bxt132. |