[1] Zheng Y. Digital signcryption or how to achieve cost (signature & encryption) cost (signature)+cost (encryption)//Advances in Cryptology in Proceedings of Crypto'97. Berlin: Springer-Verlag, 1997: 165-179. [2] Bao F, Deng R H. A signcryption scheme with signature directly verifiable by public key//Proceeding of PKC'98, LNCS 1998. Berlin: Springer-Verlag, 1998: 55-59. [3] Boyen X. Multipurpose identity-based signcryption: a Swiss army knife for identity-based cryptography//Proceedings of Cryptology-CRYPTO 2003, LNCS 2729. Berlin: Springer-Verlag, 2003: 383-399. [4] Chow S S M, Yiu S M, Hui L C K , et al. Efficient forward and provably secure ID-based signcryption scheme with public verifiability and public ciphertext authenticity//CISC'03, LNCS 2971. Berlin: Springer-Verlag, 2004: 352-369. [5] Jong H R, Youn S J, Dong-il S. Identity-based KCDSA signcryption. ICACT, 2006: 1369-1374. [6] Boneh D, Lynn B, Shacham H. Short signatures from the weil pairing//Advances in Cryptology-Asiacrypt 2001, LNCS 2248. : Springer-Verlag, 2001: 514-532. [7] Libert B, Quisquater J J. Efficient signcryption with key privacy form gap Diffie-Hellman group//PKC'04, LNCS 2947. Berlin: Springer-Verlag, 2004: 187-200. [8] Libert B, Quisquater J J. Improved signcryption from q-Diffie-Hellman problems//SCN04, LNCS 3352. : Springer-Verlag, 2005: 220-234. [9] Tan C H. Security analysis of signcryption scheme from q-Diffie-Hellman problems[J]. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2006: 206-208. |