[1]
Zheng Yu-liang. Digital signcryption or how to achieve cost(signature&encryption)<< cost(signature)+cost(encryption)[C]. KALISKIJ R B S Proc of Advances in CRYPTO'97. Berlin: Springer-Verlag, 1997: 165-179.
DOI: 10.1007/bfb0052234
Google Scholar
[2]
Weidong Chen, Dengguo Feng. the Application of Signcryption Scheme in Distributed Protocol [J]. Journal of Computers, 2005, 28(9): 1421- 1430.
Google Scholar
[3]
AL-RIYAMI S S, PATERSON K G. Certificateless public key cryptography[A]. In Proceedings of Advances in Cryptology-Asiacrypt'03, Nov30-Dec4, 2003, Taipei, Taiwan, LNCS2894, Berlin: Springer-Verlag, 2003: 452-473.
DOI: 10.1007/978-3-540-40061-5_29
Google Scholar
[4]
Gang Yu, Hongzhi Yang, Shuqin Fan, et al. Efficient Certificateless Signcryption Scheme[C]. Proceedings of the Third International Symposium on Electronic Commerce and Security Workshops(ISES'10), Guangzhou, P.R. China, 29-31, July 2010: 055-0559.
Google Scholar
[5]
Wu Chenhuang, Chen Zhixiong. A new efficient certificateless signcryption scheme[C]. Proc of ISISE08, vol, 1, 2008: 661-664.
DOI: 10.1109/isise.2008.206
Google Scholar
[6]
Barbosa M, Farshim P. Certificateless signcryption[C]. Proc of ASIACCS2008. New York: ACM, 2008: 369-372.
Google Scholar
[7]
Li Fagen, Masaaki S, Tsuyoshi T. Certificateless hybrid signcryption[G] PPLNCS5451: Proc of ISPEC2009. Berlin: Springer-verlag, 2009: 112-123.
Google Scholar
[8]
Hui Zhu,Hui Li,Yuming Wang. Do Not Use Bilinear Pairing Uncertificated Scheme [J]. Computer Research and Development, 2010, 47(9): 1587-1594.
Google Scholar
[9]
S. Al-Riyami, K.G. Paterson, Certificateless public key cryptography, Proceedings of ASIACRYPT 2003, LNCS 2894, Springer-Verlag, 2003, p.452–473.
DOI: 10.1007/978-3-540-40061-5_29
Google Scholar