Yang Guomin, Wong Duncan, Deng Xiaotie. Analysis and improvement of a signcryption scheme with key privacy// ISC 2005, LNCS 3650. Berlin: Springer-Verlag, 2005: 218-232.
[2]
Chik How Tan. Analysis of improved signcryption scheme with key privacy[J]. Information Processing Letters, 2006, 99(4): 135-138.
[3]
Ma Changshe. Efficient short signcryption scheme with public verifiability//Inscrypt 2006. Beijing: , 2006: 118-129.
[4]
Chik-How Tan. Forgery of provable secure short signcryption scheme[J]. IEICE Transactions on Fundamentals, 2007, E90-A(9): 1879-1880.
[5]
李发根, 胡予濮, 李刚. 一个高效的基于身份的签密方案[J]. 计算机学报, 2006, 26 (9): 1641-1647. Li Fagen, Hu Yupu, Li Gang. An efficient identity-based signcryption scheme[J]. Chinese Journal of Computers, 2006, 26(9): 1641-1647.