ZHENG Y. Digital signcryption or how to achieve cost (signature or encryption) cost (signature)+cost (encryption) [J]. LNCS.1294,1997: 291-312.?
[2]
AN J H, DODIS Y, RABIN T. On the security of joint signture and encryption[C]//Advances in cryptology Eurocrypt 2002.Berlin: Springer?Verlag, 2002:83-107.?
[3]
MALONE?LEE J. Identity based signcryption [EB/OL]. [2002-7-19]. Cryptologry ePrint Archive, Report 2002/098. http://eprint.iacr.org/2002/098.?
[4]
CHEN L, MALONE?LEE J. Improved identity?based signcryp? tion[C]// Proc of the 8th Int Workshop on Theory and Practice in Public Key Cryptography 2005, LNCS 3386. Berlin: Springer?Verlag, 2005:362-379.?
[5]
LIBERT B, QUISQUATER J. New identity based signcryption schemes from pairings[C]//Proceedings of the 2003 IEEE Information Theory Workshop.Pairs, France, 2003:155-158.?
[6]
FIAT A, NAOR M. Boradcast eneryption[C]//Proceedings of the 13th annual international cryptology conference on Advances in cryptology. New York: Springer?Verlag, 1993: 480-491.?
[7]
ZHAN L Y, HU Y P, MU N B.An Identity?based broadcast encryption protocol for ad hoc networks [J]. The 9th Internation Conference for Young Computer Scienilsts, 2009:1619-1623.?
[8]
DELERABLEE C, PAILLIER P. Fully collusion secure dynamic broadcast encryption with constant?size ciphertexts or decryption keys [C]//Proceedings of the first International Conference on Pairing?based Cryptography. Tokyo, Japan, 2007:39-59.?
[9]
BARBOSA M, FARSHIM P. Efficient identity?based key encapsulation to multiple parties[C]//Proceedings of Cryptography and coding, [s.l.], 2005:428-441.?
[10]
DELERABLEE C. Identity?based broadcast encryption with constant size ciphertexts and private keys [C]// Proceedings of the Advances in Crypotology 13th International Conference on Theory and Application of Cryptology and Information Security.[s.l.], 2007: 200-215.?
[11]
ASOKAN N, GINZBORG P. Key agreement in ad hoc networks[J].Computer Communication, 2000, 23(17): 162 7-1637.?
[12]
AL?RIYAMI S S, PATERSON K G. Certificateless public key cryptography[C]//LAIH C S.International Association for Cryptologic Research,[s.l.], 2003: 452-473.?
[13]
BARBOSA M, FARSHIM P. Certificateless signcryption?[C]//?ASIACCS’08. New York: ACM Press, 2008: 369-372.
[14]
BONEH D, FRANKLIN M. Identity?based encryption ?from the? Weil pairing[C]//Proceedings of the 21st Annual International Cryptology on Advanced in Cryption.London: Springer?Verlag, 2001:213-229.?
[15]
CHEN A M, LIU J. Malicous KGC attacks in certificateless cryptography [C]//ASIACCS’07. New York: ACM Press, 2007:302-311.?
[16]
CRAMER R, SHOUP V. A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack[C] // Proc of the Advances in Cryptology?Crypto 1998. Berlin: Springer?Verlag, 1998:13-25.