Computer Science ›› 2013, Vol. 40 ›› Issue (10): 139-143.
Previous Articles Next Articles
ZHOU Cai-xue and WANG Fei-peng
[1] Shamir A.Identity-based cryptosystems and signature schemes[C]∥Proceeding of Crypto’84.LNCS 196,Berlin:Springer-Verlag,1984:47-53 [2] Al-Riyami S S,Paterson K G.Certificateless public key cryptography[C]∥Proceeding of ASIACRYPT 2003.LNCS 2894,Berlin:Springer-Verlag,2003:452-473 [3] 于刚,韩文报.具有代理解签密功能的无证书签密方案[J].计算机学报,2011,34(7):1291-1299 [4] Yang Guo-min,Tan C H.Certificateless cryptography with KGC trust level 3[J].Theoretical Computer Science,2011,412(39):5446-5457 [5] Barbosa M,Farshim P.Certificateless signcryption[C]∥Proceeding of ASIACCS’2008.ACM,2008:369-372 [6] Zheng Yu-liang.Digital signcryption or how to achieve cost(signature and encryption)< [8] Wu Chen-huang,Chen Zhi-xiong.A new efficient certificateless signcryption scheme[C]∥Proceedinf of ISISE’2008.IEEE,2008:661-664 [9] Selvi S S D,Vivek S S,Rangan C P.Cryptanalysis of certificateless signcryption schemes and an efficient construction without pairing[C]∥Proceeding of Inscrypt 2009.LNCS 6151,Berlin:Springer-Verlag,2010:75-92 [10] Selvi S S D,Vivek S S,Shukla D,et al.Efficient and provably secure certificateless multi-receiver signcryption[C]∥Proceeding of ProvSec 2008.LNCS 5324,Berlin:Springer-Verlag,2008:52-67 [11] Selvi S S D,Vivek S S,Rangan C P.A note on the certificateless multi-receiver signcryption scheme[EB/OL].http://eprint.iacr.org/2009/308,2009-6-26 [12] Miao Song-qin,Zhang Fu-tai,Zhang Lei.Cryptanalysis of a certificateless multi-receiver signcryption scheme[C]∥Proceeding of MIMES 2010.IEEE,2010:593-597 [13] Li Fa-gen,Shirase M,Takagi T.Certificateless hybrid signcryption[C]∥Proceeding of ISPEC 2009.LNCS 5451,Berlin:Springer-Verlag,2009:112-123 [14] Selvi S S D,Vivek S S,Rangan C P.Certificateless KEM and hybrid signcryption schemes revisited[C]∥Proceeding of ISPEC 2010.LNCS 6047,Berlin:Springer-Verlag,2010:294-307 [15] 孙银霞,李晖.高效无证书混合签密[J].软件学报,2011,22(7):1690-1698 [16] Liu Zhen-hua,Hu Yu-pu,Zhang Xiang-song,et al.Certificateless signcryption scheme in the standard model[J].Information Sciences,2010,0(3):452-464 [17] Weng Jian,Yao Guo-xiang,Deng R H,et al.Cryptanalysis of a certificateless signcryption scheme in the standard model[J].Information Sciences,2011,1(3):661-667 [18] Jin Zheng-ping,Wen Qiao-yan,Zhang Hua.A supplement to Liu et al.’s Certificateless signcryption scheme in the standard mo-del[EB/OL].http://eprint.iacr.org/2010/252,2010-05-03 [19] Luo Ming,Zou Chun-hua,Xu Jian-feng.Certificateless Broadcast Signcryption with Forward Secrecy[C]∥Conference on Computational Intelligence and Security.2011:910-914 [20] 刘文浩,许春香.无双线性配对的无证书签密方案[J].软件学报,2011,22(8):1918-1926 [21] Xie Wen-jian,Zhang Zhang.Certificateless Signcryption without Pairing[EB/OL].http://eprint.iacr.org/2010/187,2010-06-20 [22] Pointcheval D,Stern J.Security arguments for digital signatures and blind signatures[J].Journal of Cryptology,2000,13(3):361-396 [23] Chen L,Cheng Z,Smart N P.Identity-based key agreement protocols from pairings[J].International Journal Information Security,2007,6(4):213-241 |
No related articles found! |
|