[1] ZHENG Y. Digital signcryption or how to achieve cost(signature & encryption)<[2] BAEK J, STEINFELD R, ZHENG Y L. Formal proofs for the security of signcryption[C]//PKC 2002:Proceedings of the 2002 International Workshop on Public Key Cryptography, LNCS 2274. Berlin:Springer, 2002:80-98. [3] BARBOSE M, FARSHIM P. Certificateless signcryption[C]//ASIACCS'08:Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security. New York:ACM, 2008:369-372. [4] ZHOU C, ZHOU W, DONG X. Provable certificateless generalized signcryption scheme[J]. Designs, Codes and Cryptography, 2014, 71(2):331-346. [5] SHI W, KUMAR N, GONG P, et al. Cryptanalysis and improvement of a certificateless signcryption scheme without bilinear pairing[J]. Frontiers of Computer Science, 2014, 8(4):656-666. [6] 夏昂,张龙军.一种新的无双线性对的无证书安全签密方案[J].计算机应用研究,2014,31(2):532-535. (XIA A, ZHANG L J. New secure certificateless signcryption scheme without pairing[J]. Application Research of Computers, 2014, 31(2):532-535.) [7] SELVI S S D, VIVEK S S, SHRIRAM J, et al. Identity based aggregate signcryption schemes[C]//INDOCRYPT 2009:Proceedings of the 10th International Conference on Progress in Cryptology, LNCS 5922. Berlin:Springer, 2009:378-397. [8] LU H J, XIE Q. An efficient certificateless aggregate signcryption scheme from pairings[C]//ICECC 2011:Proceedings of the 2011 International Conference on the Electronics, Communications and Control. Piscataway, NJ:IEEE, 2011:132-135. [9] JIANG Y, LI J, XIONG A. Certificateless aggregate signcryption scheme for wireless sensor network[J]. International Journal of Advancements in Computing Technology, 2013, 5(8):456-463. [10] 张雪枫,魏立线,王绪安.无证书的可公开验证聚合签密方案[J].计算机应用,2013,33(7):1858-1860. (ZHANG X F, WEI L X, WANG X Z. Certificateless aggregate signcryption scheme with public verifiability[J]. Journal of Computer Applications, 2013, 33(7):1858-1860.) [11] ESLAMI Z, PAKNIAT N. Certificateless aggregate signcryption:security model and a concrete construction secure in the random oracle model[J]. Journal of King Saud University Computer and Information Sciences, 2014, 26(3):276-286. [12] 刘建华,毛可飞,胡俊伟.基于双线性对的无证书聚合签密方案[J].计算机应用,2016,36(6):1558-1562. (LIU J H, MAO K F, HU J W. Certificateless aggregate signcryption scheme based on bilinear pairings[J]. Journal of Computer Applications, 2016, 36(6):1558-1562.) [13] YIN S-L, LI H, LIU J. A new provable secure certificateless aggregate signcryption scheme[J]. Journal of Information Hiding and Multimedia Signal Processing, 2016, 7(6):1274-1281. [14] 张玉磊,王欢,李臣意,等.可证安全的紧致无证书聚合签密方案[J].电子信息学报,2015,37(12):2838-2844. (ZHANG Y L, WANG H, LI C Y, et al. Provable secure and compact certificateless aggregate signcryption scheme[J]. Journal of Electronics and Information Technology, 2015, 37(12):2838-2844.) [15] DENG L, ZENG J, QU Y. Certificateless proxy signature from RSA[J]. Mathematical Problems in Engineering, 2014, 2014(9):Article ID 373690. [16] 张华,温巧燕,金正平.可证明安全算法与协议[M].北京:科学出版社,2012:76-77. (ZHANG H, WEN Q Y, JIN Z P. Provable Security Algorithms and Protocols[M]. Beijing:Science Press, 2012:76-77.) |