[1] Zheng Yuliang. Digital signcryption or how to achieve cost (signature & encryption)<th Annual International Cryptology Conference on Advances in Cryptology. Berlin: Spring, 1997: 165-179.[2] 庞辽军, 崔静静, 李慧贤, 等. 新的基于身份的多接收者匿名签密方案[J]. 计算机学报, 2011, 34(11): 2014-2113. Pang Liaojun, Cui Jingjing, Li Huixian, et al. A new multi-receiver ID-based anonymous signcryption[J]. Chinese Journal of Computer, 2011, 34(11): 2014-2113.[3] 刘文琦, 顾宏, 杨建华. 基于身份的同时生效签密体制研究[J]. 电子与信息学报, 2011, 33(7): 1582-1588. Liu Wenqi, Gu Hong, Yang Jianhua. Identity-based concurrent signcryption scheme[J]. Journal of Electronics and Information Technology, 2011, 33(7): 1582-1588.[4] 刘连东, 冀会芳, 韩文报, 等. 一种无随机预言机的无证书广义签密方案[J]. 软件学报, 2012, 23(2): 394-410. Liu Liandong, Ji Huifang, Han Wenbao, et al. Certificate less generalized signcryption scheme without random oracles[J]. Journal of Software, 2012, 23(2): 394-410.[5] 赵秀凤, 徐秋亮. 一个有效的多PKG环境下基于身份签密方案[J]. 计算机学报, 2012, 35(4): 673-681. Zhao Xiufeng, Xu Qiuliang. An efficient multi-PKG ID-based signcryption scheme[J]. Chinese Journal of Computer, 2012, 35(4): 673-681.[6] Zhang Bo, Xu Qiuliang. Identity-based multisigncryption scheme without random oracles[J]. Chinese Journal of Computers, 2010, 33(1): 103-110.[7] 张秋璞, 叶顶锋. 对一个基于身份的多重签密方案的分析与改进[J]. 电子学报, 2011, 39(12): 2714-2720. Zhang Qiupu, Ye Dingfeng. Cryptanalysis and improvement of an identity-based multi signcryption scheme[J]. Acta Electronica Sinica, 2011, 39(12): 2714-2720.[8] Yap W S, Heng S H, Goi B M. On the security of an identity-based aggregate signature scheme[C]//The 22nd International Conference on Advanced Information Networking and Applications-Workshops, AINAW 2008. Okinawa: IEEE Press, 2008: 1523-1528.[9] 肖龙, 王标, 孙琦. 基于环Zn上圆锥曲线数字签名和多重数字签名[J]. 西安交通大学学报, 2006, 40(6): 648-718. Xiao Long, Wang Biao, Sun Qi. Digital signature and multiple digital signatures based on the conic curve over Zn[J]. Journal of Xi'an Jiao Tong University, 2006, 40(6): 648-718.[10] 孙琦, 朱文余, 王标. 环Zn上圆锥曲线和公钥密码协议[J]. 四川大学学报: 自然科学版, 2005, 42(3): 471-478. Sun Qi, Zhu Wenyu, Wang Biao. The conic curve over Zn and public-key cryptosystem protocol[J]. Journal of Sichuan University: Natural Science Edition, 2005, 42(3): 471–478.[11] 王标, 方颖珏, 林宏刚, 等. 基于环Zn上圆锥曲线的QV签名方案[J]. 中国科学, 2009, 39(2): 212-217. Wang Biao, Fang Yingjue, Liu Honggang, et al. QV signature protocol on conic curve over ring Zn[J]. Science in China, 2009, 39(2): 212-217.[12] Dai Zongduo, Pei Dingyi, Yang Junhui, et al. Cryptanalysis of a public key cryptosystem based on conic curves[C]//The International Workshop on Cryptographic Techniques and E-Commerce. Hong Kong:[s.n.], 1999: 259-261.[13] Wiener M J. Cryptanalysis of short RSA secret exponents[J]. IEEE Trans Inf Theory, 1990, 36(3): 553-558.[14] Li Hangyu. The scalar multiplication of points on a conic over finite fields[J]. Information Security and Communications Privacy, 2007(8): 64-69. |