[1] ZHENG Y. Digital signcryption or how to achieve cost (signature & encryption)cost(signature)+cost(encryption)encryption) [C]// CRYPTO'97: Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology, LNCS 1294. Berlin: Springer-Verlag, 1997: 165-179.[2] XIE WENJIAN, ZHANG ZHANG. Efficient and provably secure certificateless signcryption from bilinear maps [C]// WCNIS 2010: 2010 IEEE International Conference on Wireless Communications, Networking and Information Security. Washington, DC: IEEE Computer Society, 2010: 558-562.[3] SELVI S S D, VIVEK S S, RANGAN C P. Security weaknesses in two certificateless signcryption schemes [EB/OL]. [2011-01-11]. http://eprint.iacr.org/2010/092.pdf.[4] 俞惠芳,赵海兴,王之仓,等.基于DLP的自认证代理签密方案[J].计算机科学,2010,37(5):66-67.[5] 曹正军,刘木兰.数字签名方案中的孤悬因子和冗余数据[J].计算机学报,2006,29(2):249-255.[6] AL-RIYAMI S S, PATERSON K G. Certifieateless public key cryptography [C]// ASIACRYFF 2003: Proceedings of the 9th International Conference on the Theory and Application of Cryptology and Information Security, LNCS 2894. Berlin: Springer-Verlag, 2003: 452-473.[7] BARBOSA M, FARSHIM P. Certificateless signcryption [C]// Pro-ceedings of the 2008 ACM Symposium on Information, Computer and Communications Security. New York: ACM Press, 2008: 369-372.[8] WU CHENHUANG, CHEN ZHIXIONG. A new efficient certificateless signcryption scheme [C]// ISISE'08: Proceedings of the 2008 International Symposium on Information Science and Engieering. Washington, DC: IEEE Computer Society, 2008: 661-664.[9] LIU ZHENHUA, HU YUPU, ZHANG XIANGSONG, et al. Certificateless signcryption scheme in the standard model [J]. Information Sciences, 2010, 180(3): 452-464.[10] BARRETO P S L M, KIM H Y, LYNN B, et al. Efficient algorithms for pairing-based cryptosystems [C]// CRYPTO'02: Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology, LNCS 2442. Berlin: Springer-Verlag, 2002: 354-368.[11] GAMAGE C, LEIWO J, ZHENG Y. An efficient scheme for secure message transmission using proxy signcryption [C]// Proceedings of the 22nd Australasian Computer Science Conference. Berlin: Springer-Verlag, 1999: 420-431.