[1] ZHENG Y. Digital signcryption or how to achieve cost (Signature & Encryption)≤ost(Signature)+cost(Encryption)[C]//Proceedings of the Cryptology-CRYPTO'97, LNCS 1294. Berlin:Springer, 1997:165-179. [2] MALONE-LEE J. Identity-based signcryption[C]//Proceedings of Public Key Cryptography-PKC 2005, LNCS 3386. Berlin:Springer, 2002:362-379. [3] SHAMIR A. Identity-based crypto systems and signature schemes[C]//Proceedings of CRYPTO 84 on Advances in Cryptology. New York:Springer-Verlag, 1984:47-53. [4] 张串绒,张玉清,李发根,等.适用于Ad Hoc网络安全通信的新签密算法[J].通信学报,2010,31(3):19-24.(ZHANG C R, ZHANG Y Q, LI F G, et al. New signcryption algorithm for secure communication of Ad Hoc networks[J]. Journal on Communications, 2010, 31(3):19-24.) [5] 张宇,杜瑞颖,陈晶,等.对一个基于身份签密方案的分析与改进[J].通信学报,2015,36(11):174-179.(ZHANG Y, DU R Y, CHEN J, et al. Analysis and improvement of an identity-based signcryption[J]. Journal on Communications, 2015, 36(11):174-179.) [6] REGEV O. Lattice-based cryptography[C]//Advances in Cryptology-CRYPTO 2006. Berlin:Springer, 2006:131-141. [7] REGEV O. On lattices, learning with errors, random linear codes, and cryptography[J]. Journal of the ACM, 2009, 56(6):Article No. 34. [8] AGRAWAL S, DAN B, BOYEN X. Efficient lattice (H)IBE in the standard model[C]//Proceedings of the 29th Annual International Conference on Theory and Applications of Cryptographic Techniques. Berlin:Springer, 2010:553-572. [9] SINGH K, PANDURANGAN C, BANERJEE A K. Adaptively secure efficient lattice (H)IBE in standard model with short public parameters[C]//Proceedings of the 2nd International Conference on Security, Privacy, and Applied Cryptography Engineering. Berlin:Springer, 2012:153-172. [10] 张彦华,胡予濮,江明明,等.格上可撤销的基于身份的适应性安全的加密方案[J].电子与信息学报,2015,37(2):423-428.(ZHANG Y H, HU Y P, JIANG M M, et al. A Lattice-based revocable adaptive-ID secure encryption scheme[J].Journal of Electronics & Information Technology, 2015,37(2):423-428.) [11] LI F, BIN MUHAYA F T, KHAN M K, et al. Lattice-based signcryption[J]. Concurrency & Computation Practice & Experience, 2013, 25(14):2112-2122. [12] YAN J H, WANG L C, WANG L H, et al. Efficient lattice-based signcryption in standard model[J]. Mathematical Problems in Engineering,2013(11):1-18. [13] MICCIANCIO D, PEIKERT C. Trapdoors for lattices:simpler, tighter, faster, smaller[C]//Proceedings of the 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques. Berlin:Springer, 2011:700-718. [14] LU X H, WEN Q Y, JIN Z P, et al. A lattice-based signcryption scheme without random oracle[J]. Frontiers of Computer Science,2014,8(4):667-675. [15] GVNTHER C G. An identity-based key-exchange protocol[C]//Proceedings of the 1989 Workshop on the Theory and Application of Cryptographic Techniques. Berlin:Springer, 1989:235-238. [16] SINGH K, PANDURANGAN C, BANERJEE A K. Lattice forward-secure identity based encryption scheme[J].Journal of Internet Services and Information Security, 2012, 2(3/4):118-128. [17] AGRAWAL S, DAN B, BOYEN X. Lattice basis delegation in fixed dimension and shorter-ciphertext hierarchical IBE[C]//Proceedings of the 30th Annual Conference on Advances in Cryptology. Berlin:Springer, 2010:98-115. [18] GORDON S D, KATZ J, VAIKUNTANATHAN V. A group signature scheme from lattice assumptions[C]//Proceedings of the 16th International Conference on the Theory and Application of Cryptology and Information Security. Berlin:Springer, 2010:395-412. [19] GENTRY C, PEIKERT C, VAIKUNTANATHAN V. Trapdoors for hard lattices and new cryptographic constructions[J]. Electronic Colloquium on Computational Complexity, 2015, 14:197-206. |