Computer Science ›› 2013, Vol. 40 ›› Issue (11): 112-116.
Previous Articles Next Articles
SUN Hua and ZHENG Xue-feng
[1] Shamir A.Identity-based cryptosystems and signature schemes[C]∥Proceedings of CRYPTO 1984,LNCS 196.Berlin:Sprin-ger-Verlag,1985:47-53 [2] Al-Riyami S S,Paterson K G.Certificateless public key cryptography[C]∥Proceedings of ASIACRYPT 2003,LNCS 2894.Berlin:Springer-Verlag,2003:452-473 [3] Zheng Yu-liang.Digital signcryption or how to achieve cost(signature & encryption)< [5] Baek J,Steinfeld R,Zheng Yu-liang.Formal proofs for the security of signcryption[J].Journal of Cryptology,2007,20(2):203-235 [6] Barbosa M,Farshim P.Certificateless signcryption[C]∥ Proceedings of ASIACCS 2008.ACM,New York,2008:369-372 [7] Aranha D,Castro R,Lopez J,et al.Efficient certificateless signcryption[EB/OL].http://labcom.inf.ufrgs.br/labcom/ceseg/anais/2008/data/pdf/st03_01_resumo.pdf [8] Wu Chen-huang,Cheng Zhi-xiong.A new efficient certificateless signcryption scheme[C]∥Proceedings of ISISE 2008.IEEE Computer Society,2008:661-664 [9] Selvi S S D,Vivek S S,Rangan C P.Cryptanalysis of certificateless signcryption schemes and an efficient construction without pairing[EB/OL].Cryptology ePrint Archive,2009.http://eprint.iacr.org/2009/298 [10] Selvi S S D,Vivek S S,Shukla D,et al.Efficient and provably secure certificateless multi-receiver signcryption[C]∥Proceedings of ProvSec 2008,LNCS 5324.Berlin:Springer-Verlag,2008:52-67 [11] Xie Wen-jian,Zhang Zhang.Efficient and provably secure certifi-cateless signcryption from bilinear maps[C]∥Proceedings of WCNIS 2010.IEEE Press,2010:558-562 [12] Barreto P S L M,Libert B,Mccullagh N,et al.Efficient and provably-secure identity-based signatures and signcryption from bilinear maps[C]∥Proceedings of ASIACRYPT 2005,LNCS 3788.Berlin:Springer-Verlag,2005:515-532 [13] Chen Yan,Zhang Fu-tai.A new certificateless public key en-cryption scheme[J].Wuhan University Journal of Natural Sciences,2008,13(6):721-726 [14] Selvi S S D,Vivek S S,Rangan C P.Security weaknesses in two certificateless signcryption schemes[EB/OL].Cryptology ePrint Archive,2010.http://eprint.iacr.org/2010/092 [15] Liu Zhen-hua,Hu Yu-pu,Zhang Xiang-song,et al.Certificateless signcryption scheme in the standard model[J].Information Sciences,2010,180(3):452-464 [16] Weng Jian,Yao Guo-xiang,Deng R H,et al.Cryptanalysis of a certificateless signcryption scheme in the standard model[J].Information Sciences,2011,181(3):661-667 [17] Li Peng-cheng,He Ming-xing,Li Xiao,et al.Efficient and prova-bly secure certificateless signcryption from bilinear pairings[J].Journal of Computational Information Systems,2010,6(11):3643-3650 [18] Du Hong-zhen,Wen Qiao-yan.Efficient and provably-securecertificateless short signature scheme from bilinear pairings[J].Computer Standards and Interfaces,2009,31(2):390-394 [19] Javier H,German S.Forking lemmas for ring signature schemes[C]∥Proceedings of INDOCRYPT 2003,LNCS 2904.Berlin:Springer-Verlag,2003:266-279 |
No related articles found! |
|