[1] ZHENG Y L. Digital signcryption or how to achieve cost (signature & encryption) << cost (signature) + cost (encryption)[C]//CRYPTO'97: Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology, LNCS 1294. Berlin: Springer, 1997: 165-179. [2] MALONE-LEE J. Identity-based signcryption[C]//PKC 2005: Proceedings of the 8th International Workshop on Theory and Practice in Public Key Cryptography, LNCS 3386. Berlin: Springer, 2005: 362-379. [3] LIBERT B, QUISQUATER J-J. A new identity based signcryption schemes from pairings[C]//ITW 2003: Proceedings of the 2003 IEEE Information Theory Workshop. Piscataway, NJ: IEEE, 2003: 155-158. [4] SELVI S S D, VIVEK S S, SHRIRAM J, et al. Identity based aggregate signcryption schemes[C]//INDOCRYPT 2009: Proceedings of the 10th International Conference on Progress in Cryptology, LNCS 5922. Berlin: Springer, 2009: 378-397. [5] DENT A W. Aggregate signcryption[EB/OL].[2015-09-29]. https://eprint.iacr.org/2012/200.pdf. [6] REN X Y, Qi Z H, GENG Y. Provably secure aggregate signcryption scheme[J]. ETRI Journal, 2012, 34(3): 421-428. [7] 苏爱东,张永翼.密文长度固定的全聚合签密方案[J].计算机应用研究,2015,32(9):2820-2822.(SU A D, ZHANG Y Y. Aggregate signcryption scheme with full aggregation and constant ciphertext[J]. Application Research of Computers, 2015, 32(9): 2820-2822.) [8] 王大星,腾济凯.可证明安全的基于身份的聚合签密方案[J].计算机应用,2015,35(2):412-415.(WANG D X, TENG J K. Provably secure identity-based aggregate signcryption scheme[J]. Journal of Computer Applications, 2015, 35(2): 412-415.) [9] Al-RIYAMI S S, PATERSON K G. Certificateless public key cryptography[C]//ASIACRYPT 2003: Proceedings of the 9th International Conference on the Theory and Application of Cryptology and Information Security, LNCS 2894. Berlin: Springer, 2003: 452-473. [10] BARBOSA M, FARSHIM P. Certificateless signcryption[C]//ASIACCS 2008: Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security. New York: ACM, 2008: 369-372. [11] QI Z H, YANG G, REN X Y. Provably secure certificateless ring signcryption scheme[J]. China Communications, 2011, 8(3): 99-106. [12] 陆海军.聚合签名与聚合签密研究[D].杭州:杭州师范大学,2012:46-60.(LU H J. Aggregate signature and aggregate signcryption research[D]. Hangzhou: Hangzhou Normal University, 2012: 46-60.) [13] ESLAMI Z, PAKNIAT N. Certificateless aggregate signcryption: security model and a concrete construction secure in the random oracle model[J]. Journal of King Saud University-Computer and Information Sciences, 2014, 26(3): 276-286. [14] HAN Y L, CHEN F. The multilinear maps based certificateless aggregate signcryption scheme[C]//Proceedings of the 2015 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC). Piscataway, NJ: IEEE, 2015: 92-99. [15] 俞惠芳,杨波.可证安全的无证书混合签密[J].计算机学报,2015,38(4):804-813.(YU H F, YANG B. Provably secure certificateless hybrid signcryption[J]. Chinese Journal of Computers, 2015, 38(4): 804-813.) [16] 刘哲,刘建伟,伍前红,等.车载网络中安全有效分布式的假名生成[J].通信学报,2015,36(11):33-40.(LIU Z, LIU J W, WU Q H, et al. Secure and efficient distributed pseudonym generation in VANET[J]. Journal on Communications, 2015, 36(11): 33-40.) |