[1]ZHENG YULIANG. Digital signcryption or how to achieve cost (signature & encryption)<<cost (signature)+cost (encryption) [C]// CRYPTO'97: Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology, LNCS 1294. Berlin: Springer-Verlag, 1997: 165-179.[2]BAEK J, STEINFELD R, ZHENG Y. Formal proofs for the security of signcryption [C]// PKC 2002: Proceedings of the 5th International Workshop on Practice and Theory in Public Key Cryptosystems: Public Key Cryptography, LNCS 2274. Berlin: Springer-Verlag, 2002: 80-98.[3]LEE M J. Identity-based signcryption [EB/OL]. [2011-04-11]. http://eprint.iacr.org/ report 2002/98.〖HJ1.65mm〗[4]LIBERT B, QUISQUATER J J. Efficient signcryption with key privacy from Gap Diffie-Hellman groups [C]// PKC 2004: Proceedings of the 7th International Workshop on Theory and Practice in Public Key Cryptography, LNCS 2947. Berlin: Springer-Verlag, 2004: 187-200.[5]张串绒,肖国镇.一个可公开验证签密方案的密码分析和改进[J].电子学报,2006,34(1):177-179.[6]CHOW S M, YIU S M, HUI C K, et al. Efficient forward and provably secure ID-based signcryption scheme with public verifiability and public ciphertext authenticity [C]// ICICS 2003: Proceedings of the 6th International Conference on Information Security and Cryptology, LNCS 2971. Berlin: Springer-Verlag, 2004: 352-369.[7]MU Y, VARADHARAJAN V. Distributed signcryption [C]// INDOCRYPT 2000: Proceedings of the First International Conference on Progress in Cryptology, LNCS 1977. Berlin: Springer-Verlag, 2000: 155-164.[8]PIEPRZYK J, POINTCHEVAL D. Parallel authentication and public-key encryption [C]// ACISP 2003: Proceedings of the 8th Australasian Conference on Information Security and Privacy, LNCS 2727. Berlin: Springer-Verlag, 2003: 387-401.[9]YANG G, WONG D S, DENG X. Analysis and improvement of a signcryption scheme with key privacy [C]// ISC 2005: Proceedings of the 8th International Conference on Information Security, LNCS 3650. Berlin: Springer-Verlag, 2005: 218-232.[10]TSO R, OKAMOTO T, OKAMOTO E. ECDSA—Verifiable sign-cryption scheme with signature verification on the signcrypted message [C]// Inscrypt 2007: Proceedings of the Third SKLOIS Conference on Information Security and Cryptology, LNCS 4990. Berlin: Springer-Verlag, 2008: 11-24. |