共 26 条
[4]
Fully secure identity-based signcryption scheme with shorter signcryptext in the standard model[J] . Xiangxue Li,Haifeng Qian,Jian Weng,Yu Yu.  Mathematical and Computer Modelling . 2013 (3-4)
[6]
Hybrid signcryption. Bj?rstad TE. Practical Signcryption.Information Security and Cryptography .
[7]
An efficient multi-message multi-receiver signcryption scheme with forward secrecy on elliptic curves. Din N,Umar AI,Waheed A,Amin NU. Cryptology e Print Archive:Report 2015 /655 . 2015
[8]
Tight chosen ciphertext attack(CCA)-secure hybrid encryption scheme with full public verifiability[J]. KANG Li,TANG XiaoHu,LIU JiaFen. Science China(Information Sciences). 2014(11)
[9]
Identity‐based multi‐receiver threshold signcryption scheme[J] . Huawang Qin,Yuewei Dai,Zhiquan Wang.  Security Comm. Networks . 2010 (11)
[10]
An efficient identity-based signcryption scheme for multiple receivers. Selvi S S D,Vivek S S,Srinivasan R, et al. Advances in Information and Computer Security 2009 . 2009