[1]
ZHENG YU-LIANG. Digital signcryption or how to achieve cost(signature&encryption) <<cost(signature)+ Cost(encryption)[C]/KALISKIJ R B S Proc of Advances in Cryptology-CRYPTO'97. Berlin: Springer-Verlag, 1997: 165-179.
DOI: 10.1007/bfb0052234
Google Scholar
[2]
GAMAGE C, LEIWO J, ZHENG Y. An efficient scheme for secure message transmission using proxy signcryption [C]∥Proceedings of 22nd Australasian Computer Science Conference. Berlin: Springer-Verlag, 1999: 4202431.
Google Scholar
[3]
CHAN W K, WEI V K. A threshold proxy signcryption[C]∥Proceedings of International Conference on Security and Management . Monte Carlo Resort, Las Vegas, Nevada, USA, 2002: 24-27.
Google Scholar
[4]
LI XIAN XUE, CHEN KEFEI. Identity-based Proxy-signature Scheme from Pairings[C]/Proceedings of SCC'04. Los Alamitos, USA: IEEE Computer Society Press, 2004: 494-497.
DOI: 10.1109/scc.2004.1358050
Google Scholar
[5]
WANG MENG, LI HUI, LIU ZHIJING. Efficient Identity-based Proxy-signcryption Schemes with Forword Security and Public Verifiability[C]/Proc. Of the 3rd International Conference on Networking and Mobile Computing. [S. l. ]: Springer-Verlag, 2005: 982-991.
DOI: 10.1007/11534310_103
Google Scholar
[6]
DUAN SHANSHAN, CAO ZHENFU, ZHOU YUAN. Secure Delegation-by-warrant ID-based Proxy Signcryption Scheme[C]/Proc. of CIS'05. [S. l. ]: Springer-Verlag, 2005: 445-450.
DOI: 10.1007/11596981_65
Google Scholar
[7]
Xuan Yang,Shaoping Yu. An efficient identity-based proxy signcryption scheme[J]. Computer Engineering, 2009, 35(2): 170-171, 183.
Google Scholar
[8]
ANDERSON R. Invited lecture∥Proceedings of the 4th ACM Conference on Computer and Communications Security. Zurich, Switerland, 1997: 1-7.
Google Scholar
[9]
Gang Yu, Gengxun Huang. A forward secure id-based proxy signcryption scheme[J]. Computer Engineering and Application, 2008, 44(2): 157-159.
Google Scholar
[10]
Yixian Yang, Xinxin Niu. Applied Cryptography[M]. Beijing: Beijing University of Posts and Telecommunications Press, 2005: 133-134.
Google Scholar
[11]
YONG-RAN LEE AND HYANG-SOOK LEE. An Authenticated Certificateless Public Key Encryption Scheme[J]. Information Center for Mathematical Sciences, Volume 8, Number 1, June, 2005: 177-187.
Google Scholar