参考文献
[ 1 ] Zheng Yuliang. Digital Signcryption or How to Achieve
Cost(Sign-ature & Encryption Cost) << Cost ( Signature)
+ Cost ( Encryption ) [ C ] / / Proceedings of the
17th Annual International Cryptology Conference. Santa
Barbara,USA:[s. n. ],1997:165-179.
[ 2 ] Steinfeld R, Zheng Yuliang. A Signcryption Scheme
Based on Integer Factorization[C] / / Proceedings of the
3rd International Workshop on Information Security.
Wollongong,Australia:[s. n. ],2000:131-146.
[ 3 ] Li Fagen, Tsuyoshi T. Secure Identity-based
Signcryption in the Standard Model [J]. Mathematical
and Computer Modelling,2013,57(11/ 12):2685-2694.
[ 4 ] Pang Liaojun, Li Huixian, Gao Lu, et al. Completely
Anonymous Multi-recipient Signcryption Scheme with
Public Verification[J]. PLOS One,2013,8(5).
[ 5 ] Gamage G, Leiwo J, Zheng Yuliang. An Efficient
Scheme for Secure Message Transmission Using Proxy
Signcryption[C] / / Proceedings of the 22nd Australasian
Computer Science. Berlin, Germany: [ s. n. ], 1999:
420-431.
[ 6 ] 王 琴. 一种基于身份的代理签密体制[J]. 计算机工
程,2011,37(19):120-121,125.
[ 7 ] 王会歌,王彩芬,曹 浩,等. 无证书代理重签密方
案[J]. 武汉大学学报:理学版,2012,(4):370-376.
[ 8 ] 邱卫东,陈克非,白英彩. 新型Rabin 签名方案[J].
软件学报,2000,11(10):1333-1337.
[ 9 ] Qiu Weidong, Chen Kefei. Identity Oriented Signature
Scheme Based on Quadratic Residues[J]. Mathematics
and Computation,2005,168(1):235-242.
(下转第140 页)
(上接第134 页)
[10] Clifford C. An Identity Based Encryption Scheme Based
on Quadratic Residues[C] / / Proceedings of the 8th IMA
International Conference on Cryptography and Coding.
Cirencester,UK:[s. n. ],2001:360-363.
[11] 柴震川,董晓蕾,曹珍富. 利用二次剩余构造的基于身
份的数字签名方案[J]. 中国科学,2009,39 (2):
199-204.
[12] Yu Yong, Mu Yi, Susilo W. Provably Secure Proxy
Signature Scheme from Factorization [J]. Mathematics
and Computation Modelling,2012,55(3/ 4):1160-1168.
[13] 谷利泽,张 胜,杨义先. 一种新型代理签密方案[J].
电子与信息学学报,2005,27(9):1463-1466.
[14] Jonathan K, Lindell Y. Introduction to Modern
Cryptography[M]. New York,USA:Chapman & Hall /
CRC,2008.
[15] Pointcheval D,Stern J. Security Arguments for Digital
Signatures and Blind Signatures [ J ]. Journal of
Cryptology,2000,13(3):361-396.
[16] Pointcheval D,Stern J. Security Proofs for Signatures
Schemes[EB / OL]. (2012-12-20). http:/ / www.di.ens. fr /
users/ pointche/ Documents/ Papers/ 2000_joc. pdf.
[17] Bellare M, Neven G. Multi-signatures in the Plain
Public-key Model and a General Forking Lemma[C] / /
Proceedings of the 13th Association for Computing
Machinery Conference on Computer and Communications
Security. Alexandria,USA:[s. n. ],2006:390-399.
编辑 刘 冰 |