Shamir A. Identity-based cryptosystems and signature schemes//Proceedings of Crypto 1984. New York: Springer-Verlag, 1985: 47-53.
[2]
Boneh D, Franklin M. Identity-based encryption from the Weil pairing//Proceedings of Crypto 2001. Santa Barbara: Springer-Verlag, 2001: 213-229.
[3]
Gentry C. Practical identity-based encryption without random oracles//Proceedings of Eurocrypt 2006. St. Petersburg: Springer-Verlag, 2006: 445-464.
[4]
Waters B. Efficient identity-based encryption without random oracles//Proceedings of Eurocrypt 2005. Aarhus: Springer-Verlag, 2005: 114-127.
[5]
Hess F. Efficient identity based signature schemes based on pairings//Proceedings of SAC 2002. Newfoundland: Springer-Verlag, 2002: 310-324.
[6]
Paterson K G, Schuldt J C N. Efficient identity-based signatures secure in the standard model//Proceedings of ACISP 2006. Melbourne: Springer-Verlag, 2006: 207-222.
[7]
Zheng Yuliang. Digital signcryption or how to achieve cost(signature & encryption)cost(signature)+cost(encryption)//Advances in Cryptology-Crypto 1997. California: Springer-Verlag, 1997: 165-179.
[8]
An J H, Yevgeniy Dodis, Tal Rabin. On the security of joint signature and encryption//Advances in Cryptology-Eurocrypt 2002. Netherlands: Springer-Verlag, 2002: 83-107.
[9]
Libert B, Quisquater J J. Efficient signcryption with key privacy from gap diffie-hellman groups//Proceedings of PKC 2004. Singapore: Springer-Verlag, 2004: 187-200.
[10]
Malone-Lee J. Identity-based signcryption. 2002.
[11]
Libert B, Quisquater J J. New identity based signcryption schemes from pairings. 2003. http://eprint. iacr. org/.
[12]
Duan Shanshan, Cao Zhenfu, Lu Rongxing. Robust id-based threshold signcryption scheme from pairings//Proceedings of 3rd International Conference on Information Security. Shanghai: ACM, 2004: 33-37.
[13]
Peng Changgen, Li Xiang. An identity-based threshold signcryption scheme with semantic security//Proceedings of CIS 2005. Xian: Springer-Verlag, 2005: 173-179.
[14]
Li Fagen, Yu Yong. An efficient and provably secure id-based threshold signcryption scheme//Proceedings of ICCCAS 2008. Xiamen: Springer-Verlag, 2008: 488-492.