[1] Sevin P E, Strasser M, Basin D. Securing the distribution and storage of secrets with trusted platform modules//WISTP07, LNCS 4462. Berlin: Springer-Verlag, 2007: 53-66. [2] Boneh D, Lynn B, Shacham H, Short signatures from the weil pairings//Advances in Cryptology - Asiacrypt'01, LNCS 2248. Berlin: Springer-Verlag, 2001: 514-532. [3] 侍伟敏, 钮心忻, 杨义先. 多证明签名方案及在交叉认证中的应用[J]. 北京邮电大学学报, 2006, 29(2): 22-25. Shi Weimin, Niu Xinxin, Yang Yixian. Multi-certification signature scheme and its application to cross certification[J]. Journal of Beijing University of Posts and Telecommunications, 2006, 29(2): 22-25. [4] Girault M G. Self-certified public keys//Advances in Cryptology(Proceedings of EuroCrypt'91), LNCS 547. Berlin: Springer-Verlag, 1991: 490-497. [5] Shao Zuhua. Self-certified signature scheme from pairings[J]. The Journal of Systems & Software, 2007, 80(3): 388-395. [6] 杜红珍, 温巧燕. 高效的短签密方案[J]. 北京邮电大学学报, 2008, 31(1): 84-87. Du Hongzhen, Wen Qiaoyan. Efficient short signcryption scheme[J]. Journal of Beijing University of Posts and Telecommunications, 2008, 31(1): 84-87. [7] 李发根, 胡予濮, 李刚. 一个高效的基于身份的签密方案[J]. 计算机学报, 2006, 26(9): 1641-1647. Li Fagen, Hu Yupu, Li Gang. An efficient identity-based signcryption scheme. Chinese Journal of Computers, 2006, 26(9): 1641-1647. [8] Yang Guomin, Wong Duncan, Deng Xiaotie. Analysis and improvement of a signcryption scheme with key privacy//ISC 2005, LNCS 3650. Berlin: Springer-Verlag, 2005: 218-232. [9] Chik How Tan. Analysis of improved signcryption scheme with key privacy[J]. Information Processing Letters, 2006, 99(4): 135-138. [10] Chung Ki Li, Yang Guomin, Wong Duncan, et al. An efficient signcryption scheme with key privacy//EuroPKI 2007, LNCS 4582. Berlin: Springer-Verlag, 2007: 78-93. [11] Li Fagen, Xin Xiangjun, Hu Yupu. A pairing-based signcryption scheme using self-certified public keys[J]. International Journal of Computers and Applications, 2007, 29(3): 278-282. [12] Sattam S Al-riyami, Kenneth G. Paterson and royal holloway, certificateless public key cryptography//Asiacrypt 2003, LNCS 2894. Berlin: Springer-Verlag, 2003: 452-473. [13] Lü Jiqiang, Wang Xinmei, Kim Kwangjo. Practical convertible authenticated encryption schemes using self-certified public keys[J]. Applied Mathematics and Computation, 2005, 169(2): 1285-1297. |