[1]
Shamir A. Identity-based Cryptosystems and Signature Schemes [ C]/Advances in Cryptology , Crypto'84 : LNCS 196. New York : Springer Verlag , 1984 : 47-53.
DOI: 10.1007/3-540-39568-7_5
Google Scholar
[2]
Boneh D, Franklin M. Identity-based encryption from the weil pairing[C]/ Kilian J, ed. Advances in Cryptology-CRYPTO 2001, LNCS 2139. Berlin, Heidelberg: Springer-Verlag, 2001: 213- 229.
DOI: 10.1007/3-540-44647-8_13
Google Scholar
[3]
ZHEN G Y. Digital signcryption or how to achieve cost ( signature &encryption) < < cost ( signature) +cost ( encryption ) [ M ]/ KAL ISKI B. A dvances in Cry ptolog y : CRYPTO 1997 , Berlin : Springer , 1997 : 165-179.
DOI: 10.1007/bfb0052234
Google Scholar
[4]
Ma C, Chen K. publicly verifiable authenticated encryption[J]. Electronics Letters, 2003; 39( 3) : 281~282.
DOI: 10.1049/el:20030190
Google Scholar
[5]
Wang G L, Bao F , Ma C S . Efficient Authenticated Encryption Schemes with Public Verifiability[C]. In: Proc of the 60th IEEE Vehicular Technology Conference (VTC 2004- Fall) IEEE Computer Society, (2004).
DOI: 10.1109/vetecf.2004.1404665
Google Scholar
[6]
Chan W K, Wei V K. A Threshold Proxy Signcryption [C]. Proc. Of International Conference on Security and Management, Monte Carlo Resort, Las Vegas, Nevada, USA, 2002: 24-27.
Google Scholar
[7]
Peng Y Q, Xie S Y, Chen Y F et al. A Publicly Verifiable Authenticated Encryption Scheme with Message Linkages. ICCNMC 2005, LNCS 3619, springer- Verlag Berlin Heidelberg, 2005: 1271~1276.
DOI: 10.1007/11534310_133
Google Scholar
[8]
Dent Alexander W. Hybrid signcryption schemes wit h insider security. In : Proceedings of t he Information Security and Privacy ACISP 2005 , Brisbane , Aust ralia , 2005 , 253~266.
DOI: 10.1007/11506157_22
Google Scholar
[9]
Mitomi S , Miyaji A. A General Model of Multisignature Schemes with Message Flexibility , Order Flexibility , and Order Verifiability [J ] . IEICE Trans on Fundamentals , 2001 , E842A(10): 88-99.
DOI: 10.1007/10718964_25
Google Scholar
[10]
Seo S H , Lee S H. A Secure and Flexible Multi-signcryption Scheme [C]/ / ICCSA 2004 : LNCS 3 046. Berlin : Springer Verlag , 2004 : 689-697.
DOI: 10.1007/978-3-540-24768-5_74
Google Scholar
[11]
Zhang C R, Xiao G Z. Multi2signcryption scheme using identity and bil inear pairing [J]. JOURNAL OF XID IAN UNIVERSITY, 2007, 34(2): 270-274 (in Chinese).
Google Scholar
[12]
Zhang J H, Wang J L, Wang Y M. A multi-signcryption model and its application [J] - Journal of Xidian University(Natural Science 2004(3) (in Chinese).
Google Scholar
[13]
Meng T, Zhang X P, Sun S H. identity-Based Multi-Sincryption scheme[J]. Journal of Electronics, 2007, 35(6): 115-117 (in Chinese).
Google Scholar
[14]
Duan S, Cao Z. Efficient and Provably Secure Multi-receiver Identity-based Signcryption[C]/Proc. of Australasian Conference on Information Security and Privacy. [S. l. ]: Springer-Verlag, 2006: 195-206.
DOI: 10.1007/11780656_17
Google Scholar
[15]
Yu Yong, Yang Bo, Huang Xinyi, et al. Efficient Identity-based Signcryption Scheme for Multiple Receivers[C]/Proc. of ATC'07. [S. l. ]: Springer-Verlag, (2007).
Google Scholar