[1]Zheng Y. Digital Signcryption or How to Achieve Cost(Signature & Encryption) Cost(Signature)+Cost(Encryption)[C]//Crypto'97, LNCS 1294. Berlin: Springer-Verlag, 1997: 165-179.
[2]Baek J, Steinfeld R, Zheng Y. Formal Proofs for the Security of Signcryption [C]//PKC 2002, LNCS 2274. Berlin: Springer-Verlag, 2002: 80-98.
[3]Dent A W. Hybrid Cryptography [DB/OL]. [2007-12-25]. http://eprint.iacr.org/2004/210.
[4]Dent A W. Hybrid Signcryption Schemes with Insider Security [C]//Proceedings of ACISP 2005, LNCS 3574. Berlin: Springer-Verlag, 2005: 253-266.
[5]Dent A W. Hybrid Signcryption Schemes with Outsider Security [C]//Proceedings of ISC 2005, LNCS 3650. Berlin: Springer-Verlag, 2005: 203-217.
[6]Bj¢rstad T E. Provable Security of Signcryption [DB/OL]. [2007-10-15]. http://www.nwo.no/~tor/pdf/msc thesis.
[7]Bjrstad T E, Dent A W. Building Better Signcryption Schemes with Tag-KEMs[DB/OL]. [2007-08-09]. http://eprint.iacr.org/2005/405.
[8]Abe A, Gennaro R, Kurosawa K, et al. Tag-KEM/DEM: a New Framework for Hybrid Encryption and a New Analysis of Kurosawa-Desmedt KEM[C]//Advances in Cryptology, EUROCRYPT 2005, LNCS 3494. Berlin: Springer-Verlag, 2005: 12-46.
[9]Shoup V. A Proposal for an ISO Standard for Public Key Encryption (Version 2.1)[DB/OL]. [2007-12-10]. http://shoup.net/papers/.
[10]张串绒,肖国镇. 利用身份和双线性对的多重签密算法[J]. 西安电子科技大学学报, 2007, 34(2): 270-273.
Zhang Chuanrong, Xiao Guozhen. Multi-signcryption Scheme Using Identity and Bilinear Pairing [J]. Journal of Xidian University, 2007, 25(2): 270-273.
[11]杨超, 曹春杰, 马建峰. 通用可组合安全的Mesh网络认证协议[J]. 西安电子科技大学学报, 2007, 34 (5): 814-817.
Yang Chao, Cao Chunjie, Ma Jianfeng. Universally Composable Secure Authentication Protocol for Wireless Mesh Networks [J]. Journal of Xidian University, 2007, 34(5): 814-817. |