[1] |
LAVALLÉ E C, MARTINS B O. Reframing Civil-Military Relations in the EU:Insights from the Drone Strategy 2.0[J]. JCMS:Journal of Common Market Studies, 2024, 62(2):619-625.
|
[2] |
吴义豪, 齐彦丽, 周一青, 等. 通感算协同的无人机群轨迹规划与功率分配[J]. 西安电子科技大学学报, 2023, 50(3):61-74.
|
|
WU Yihao, QI Yanli, ZHOU Yiqing, et al. Trajectory Planning and Power Allocation of UAV Swarm Based on Interawareness and Computing[J]. Journal of Xidian University, 2023, 50(3):61-74.
|
[3] |
MAMBO M, USUDA K, OKAMOTO E. Proxy Signatures for Delegating Signing Operation[C]// Proceedings of the 3rd ACM Conference on Computer and Communications Security. New York: ACM, 1996:48-57.
|
[4] |
LI X, CHEN K, SUN L. Certificateless Signature and Proxy Signature Schemes from Bilinear Pairings[J]. Lithuanian Mathematical Journal, 2005, 45:76-83.
|
[5] |
LU R, HE D, WANG C. Cryptanalysis and Improvement of a Certificateless Proxy Signature Scheme from Bilinear Pairings[C]// Eighth ACIS International Conference on Software Engineering,Artificial Intelligence,Networking,and Parallel/Distributed Computing(SNPD 2007).Piscataway:IEEE, 2007:285-290.
|
[6] |
LI X, ZHOU L, YIN X, et al. A Security-Enhanced Certificateless Designated Verifier Aggregate Signature Scheme for HWMSNs in the YOSO Model[J]. IEEE Internet of Things Journal, 2023, 11(6):10865-10879.
|
[7] |
CHEN H, ZHANG F, SONG R. Certificateless Proxy Signature Scheme with Provable Security[J]. Journal of Software, 2009, 20(3):692-701.
|
[8] |
SEO S H, CHOI K Y, HWANG J Y, et al. Efficient Certificateless Proxy Signature Scheme with Provable Security[J]. Information Sciences, 2012, 188:322-337.
|
[9] |
ZHANG L, ZHANG F, WU Q. Delegation of Signing Rights Using Certificateless Proxy Signatures[J]. Information Sciences, 2012, 184(1):298-309.
|
[10] |
DENG L, ZENG J, HUANG H. Efficient Certificateless Proxy Signature Scheme[J]. International Journal of Foundations of Computer Science, 2016, 27(1):85-100.
|
[11] |
HU X. Security Analysis and Improvement of Proxy Signature Scheme with Certificateless and Blind Properties[C]// 2023 2nd International Conference on Big Data,Information and Computer Network(BDICN).Piscataway:IEEE, 2023:372-375.
|
[12] |
ULLAH R, MEHMOOD A, KHAN M A, et al. An Optimal Secure and Reliable Certificateless Proxy Signature for Industrial Internet of Things[J]. Peer-to-Peer Networking and Applications, 2024:1-16.
|
[13] |
GAMAGE C, LEIWO J, ZHENG Y. An Efficient Scheme for Secure Message Transmission Using Proxy-Signcryption[C]//Proceedings of the Twenty Second Australasian Computer Science Conference.Berlin, Heidelberg:Springer, 1999:18-21.
|
[14] |
QI Y, TANG C, LOU Y, et al. Certificateless Proxy Identity-Based Signcryption Scheme without Bilinear Pairings[J]. China Communications, 2013, 10(11):37-41.
|
[15] |
KHAN M A, ALHAKAMI H, ULLAH I, et al. A Resource-Friendly Certificateless Proxy Signcryption Scheme for Drones in Networks Beyond 5G[J]. Drones, 2023, 7(5):321.
|
[16] |
LO N W, TSAI J L. A Provably Secure Proxy Signcryption Scheme Using Bilinear Pairings[J]. Journal of Applied Mathematics, 2014, 2014(1):454393.
|
[17] |
WU C, YANG L, YUAN B, et al. Convertible Certificateless Proxy Re-Signcryption for Data Access Control in Cloud Computing[C]// International Conference on Computer Application and Information Security(ICCAIS 2023).Washington:SPIE, 2024:1138-1145.
|
[18] |
OBIRI I A, ADDOBEA A A, AFFUM E, et al. A Certificateless Signcryption with Proxy-Encryption for Securing Agricultural Data in the Cloud[J]. Journal of Computer Security, 2024, 32(2):77-115.
|
[19] |
YU H, WANG Z. Construction of Certificateless Proxy Signcryption Scheme from CMGs[J]. IEEE Access, 2019, 7:141910-141919.
doi: 10.1109/ACCESS.2019.2943718
|
[20] |
RAMADAN M, ELBEZ G, HAGENMEYER V. Verifiable Certificateless Signcryption Scheme for Smart Grids[C]// 2023 7th International Conference on System Reliability and Safety(ICSRS).Piscataway:IEEE, 2023:181-189.
|
[21] |
ZHANG J, DONG C, LIU Y. Efficient Pairing-Free Certificateless Signcryption Scheme for Secure Data Transmission in IoMT[J]. IEEE Internet of Things Journal, 2023, 11(3):4348-4361.
|
[22] |
VERMA G K, SINGH B B, KUMAR N, et al. An Efficient and Provable Certificate-Based Proxy Signature Scheme for IIoT Environment[J]. Information Sciences, 2020, 518:142-156.
|
[23] |
QU Y, ZENG J. Certificateless Proxy Signcryption in the Standard Model for a UAV Network[J]. IEEE Internet of Things Journal, 2022, 9(16):15116-15127.
|
[24] |
SELVI S, VIVEK S, SHUKLA D, et al. Efficient and Provably Secure Certificateless Multi-Receiver Signcryption[C]// Provable Security: Second International Conference.Berlin,Heidelberg:Springer, 2008:52-67.
|
[25] |
HUNDERA N W, SHUMENG W, MESFIN D, et al. An Efficient Online/Offline Heterogeneous Proxy Signcryption for Secure Communication in UAV Networks[J]. Journal of King Saud University-Computer and Information Sciences, 2024, 36(5):102044.
|
[26] |
HUNDERA N W, AFTAB M U, MESFIN D, et al. An Efficient Heterogeneous Online/Offline Anonymous Certificateless Signcryption with Proxy Re-Encryption for Internet of Vehicles[J]. Vehicular Communications, 2024, 49:100811.
|
[27] |
CREMERSC J F. Scyther:Semantics and Verification of Security Protocols[D]. Eindhoven: Technische Universiteit Eindhoven, 2006.
|
[28] |
BURROWS M, ABADI M, NEEDHAM R. A Logic of Authentication[J]. ACM Transactions on Computer Systems(TOCS), 1990, 8(1):18-36.
|
[29] |
AL-RIYAMI S S, PATERSON K G. Certificateless Public Key Cryptography[C]//International Conference on the Theory and Application of Cryptology and Information Security.Berlin, Heidelberg:Springer, 2003:452-473.
|
[30] |
DOLEV D, YAO A. On the Security of Public Key Protocols[J]. IEEE Transactions on Information Theory, 1983, 29(2):198-208.
|
[31] |
ELAINE B, WILLIAM B, WILLIAM P, et al. Recommendation for Key Management Part 1:General(revision 3)[J]. NIST Special Publication, 2012, 800(57):64.
|