[1] Alwen J, Dodis Y, Naor M, et al. Public-key encryption in the bounded-retrieval model[C]//Advances in Cryptology-CRYPTO 2009. Springer-Verlag, LNCS 6110, 2010: 36-54.
[2] Dodis Y, Haralambiev K, Lopez-Alt A, et al. Cryptography against continuous memory attacks[C]//IEEE 54th Annual Symposium on Foundations of Computer Science, Las Vegas, Nevada, USA, 2010: 511-520.
[3] Dodis Y, Goldwasser S, Kalai Y T, et al. Public-key encryption schemes with auxiliary inputs[C]//International Conference on Theory of Cryptography. Springer-Verlag, LNCS 5978, 2010: 361-381.
[4] Yuen T H, Chow S S M, Zhang Ye, et al. Identity-based encryption resilient to continual auxiliary leakage[C]//International Conference on Theory and Applications of Cryptographic Techniques. Springer-Verlag, LNCS 7237, 2012: 117-134.
[5] Zheng Yuliang. Digital signcryption or how to achieve cost (signature and encryption) << cost (signature)+cost (encryption)[C]//Advances in Cryptology-CRYPTO 1999. Springer-Verlag, LNCS 1294, 1997: 165-179.
[6] Baek J, Steinfeld R, Zheng Yuliang. Formal proofs for the security of signcryption[J]. Journal of Cryptology, 2002, 20(2): 80-98.
[7] Hwang Renjunn, Lai Chihhua, Su Fengfu. An efficient signcryption scheme with forward secrecy based on elliptic curve[J]. Applied Mathematics and Computation, 2005, 167(2): 870-881.
[8] Shamir A. Identity-based cryptosystems and signature schemes[C]//Advances in Cryptology-CRYPTO 1999. Springer-Verlag, LNCS 196, 2000: 47-53.
[9] Chow S S M, Yiu S M, Hui L C K, et al. Efficient forward and provably secure ID-based signcryption scheme with public verifiability and public ciphertext authenticity[C]//International Conference on Information Security and Cryptology 2003. Springer-Verlag, LNCS 2971, 2003: 352-369.
[10] Selvi S S D, Vivek S S, Shriram J, et al. Identity based aggregate signcryption schemes[C]//Progress in Cryptology-Indocrypt 2009, International Conference on Cryptology in India, New Delhi, India, 2009. Springer-Verlag, LNCS 5922, 2009: 378-397.
[11] Kar J. Provably secure identity-based aggregate signcryption scheme in random oracles[J]. International Journal of Network Security, 2015, 17(5): 580-587.
[12] Wang Hao, Liu Zhen, Liu Zhe. Unrestricted identity-based aggregate signcryption in the standard model from multilinear maps[J]. Frontier of Computer Science, 2016, 10(4): 741-754.
[13] Garg S, Gentry C, Halevi S. Candidate multilinear maps from ideal lattices[C]//Advances in Cryptology-EUROCRYPT 2013. Springer-Verlag, LNCS 7881, 2013: 1-17.
[14] Freire E S V, Hofheinz D, Paterson K G, et al. Programmable Hash functions in the multilinear setting[C]//Advances in Cryptology-CRYPTO 2013. Springer-Verlag, LNCS 8042, 2013: 513-530.
[15] Dodis Y, Reyzin L. Fuzzy extractors: how to generate strong keys from biometrics and other noisy data[C]//Advances in Cryptology-EUROCRYPT 2004. Springer-Verlag, LNCS 3027, 2004: 97-139. |