Zheng Y. Digital signcryption or how to achieve cost (signature & encryption) cost (signature)+cost (encryption)//Advances in Cryptology in Proceedings of Crypto'97. Berlin: Springer-Verlag, 1997: 165-179.
[2]
Bao F, Deng R H. A signcryption scheme with signature directly verifiable by public key//Proceeding of PKC'98, LNCS 1998. Berlin: Springer-Verlag, 1998: 55-59.
[3]
Boyen X. Multipurpose identity-based signcryption: a Swiss army knife for identity-based cryptography//Proceedings of Cryptology-CRYPTO 2003, LNCS 2729. Berlin: Springer-Verlag, 2003: 383-399.
[4]
Chow S S M, Yiu S M, Hui L C K , et al. Efficient forward and provably secure ID-based signcryption scheme with public verifiability and public ciphertext authenticity//CISC'03, LNCS 2971. Berlin: Springer-Verlag, 2004: 352-369.
[5]
Jong H R, Youn S J, Dong-il S. Identity-based KCDSA signcryption. ICACT, 2006: 1369-1374.
[6]
Boneh D, Lynn B, Shacham H. Short signatures from the weil pairing//Advances in Cryptology-Asiacrypt 2001, LNCS 2248. : Springer-Verlag, 2001: 514-532.
[7]
Libert B, Quisquater J J. Efficient signcryption with key privacy form gap Diffie-Hellman group//PKC'04, LNCS 2947. Berlin: Springer-Verlag, 2004: 187-200.
[8]
Libert B, Quisquater J J. Improved signcryption from q-Diffie-Hellman problems//SCN04, LNCS 3352. : Springer-Verlag, 2005: 220-234.
[9]
Tan C H. Security analysis of signcryption scheme from q-Diffie-Hellman problems[J]. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2006: 206-208.