[1] ZHENG Y. Digital signcryption or how to achieve cost (signature & encryption)≤ cost (signature) + cost (encryption) [C] //CRYPTO '97: Proceedings of the 17th Annual International Cryptology Conference, LNCS 1294. Berlin: Springer-Verlag, 1997: 165-179. [2] AN J H, DODIS Y, RABIN T. On the security of joint signature and encryption [C]//EUROCRYPT 2002: Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques, LNCS 2332. Berlin: Springer-Verlag, 2002: 83-107. [3] BAEK J, STEINFELD R, ZHENG Y. Formal proofs for the security of signcryption [C]//PKC 2002: Proceedings of the 5th International Workshop on Practice and Theory in Public Key Cryptosystems, LNCS 2274. Berlin: Springer-Verlag, 2002: 80-98. [4] MALONE-LEE J, MAO W. Two birds one stone: signcryption using RSA [C]//CT-RSA 2003: Proceedings of the 2003 Cryptographers' Track at the RSA Conference, LNCS 2612. Berlin: Springer-Verlag, 2003: 211-226. [5] MALONE-LEE J. Identity-based signcryption, Report 2002/098 [R/OL]. (2002-07-19) [2014-06-02]. http://eprint.iacr.org/2002/098. [6] LIBERT B, QUISQUATER J-J. A new identity based signcryption schemes from pairings [C]//ITW'2003: Proceedings of the 2003 IEEE Information Theory Workshop. Piscataway: IEEE, 2003: 155-158. [7] CHOW S S M, YIU S M, HUI L C K, et al. Efficient forward and provably secure ID-based signcryption scheme with public verifiability and public ciphertext authenticity [M]//ICISC 2003: Proceedings of the 6th International Conference on Information Security and Cryptology, LNCS 2971. Berlin: Springer-Verlag, 2004: 352-369. [8] BOYEN X. Multipurpose identity-based signcryption [C]//CRYPTO 2003: Proceedings of the 23rd Annual International Cryptology Conference, LNCS 2729. Berlin: Springer-Verlag, 2003: 383-399. [9] CHEN L, MALONE-LEE J. Improved identity-based signcryption [C]//PKC 2005: Proceedings of the 8th International Workshop on Theory and Practice in Public Key Cryptography, LNCS 3386. Berlin: Springer-Verlag, 2005: 362-379. [10] BARRETO P, LIBERT B, MCCULLAGH N, et al. Efficient and provably-secure identity-based signatures and signcryption from bilinear maps [C]//ASIACRYPT 2005: Proceedings of the 11th International Conference on the Theory and Application of Cryptology and Information Security, LNCS 3788. Berlin: Springer-Verlag, 2005: 515-532. [11] YU Y, YANG B, SUN Y, et al. Identity based signcryption scheme without random oracles [J]. Computer Standards & Interfaces, 2009, 31(1): 56-62. [12] WANG X, QIAN H. Attacks against two identity-based signcryption schemes [C]//Proceedings of the Second International Conference on Networks Security Wireless Communications and Trusted Computing. Piscataway: IEEE, 2010, 1: 24-27. [13] BONEH D, GENTRY C, LYNN B, et al. Aggregate and verifiably encrypted signatures from bilinear maps [C]//EUROCRPYT 2003: Proceedings of the 2003 International Conference on the Theory and Applications of Cryptographic Techniques, LNCS 2656. Berlin: Springer-Verlag, 2003:416-432. [14] REN X, QI Z, GENG Y. Provably secure aggregate signcryption scheme [J]. ETRI Journal, 2012, 34(3): 421-428. [15] SELVI S S D, VIVEK S S, SHRIRAM J, et al. Security analysis of aggregate signature and batch verification signature schemes, Report 2009/290 [R/OL]. [2014-06-24]. http://eprint.iacr.org/2009/290. |