1. Ma C, Mei Q, Li J. Broadcast group-oriented encryption for group communication. Journal of Computational Information Systems, 2007, 3(1): 63-71
2. An J H. Authenticated encryption in the public-key setting: security notions and analyses. http://eprint.iacr.org/2001/079, 2001
3. Jeong R, Jeong H Y, Rhee H S, et al. Provably secure encrypt-then-sign composition in hybrid signcryption. Proceedings of 5th International Conference on Information Security and Cryptology, Nov 28-29, 2002, Seoul, Korea. Berlin, Germany: Springer-Verlag, 2002: 221-232
4. Zheng Y. Digital signcryption or how to achieve cost(signature and encryption)<<cost(signature)+cost(encryption). Proceedings of 17th Annual International Cryptology Conference, Aug 17-21, Santa Barbara, CA, USA. Berlin, Germany: Springer-Verlag. 1997: 165-179
5. Lee M K, Kim D K, Park K. An authenticated encryption scheme with public verifiability. Proceedings of 4th Korea-Japan Joint Workshop on Algorthms and Computation, Jul, 2000, Tokyo, Japan. 2000: 49-56
6. Baek J, Steinfeld R, Zheng Y. Formal proofs for the security of signcryption. Proceedings of International Workshop on Practice and Theory in Public-key Cryptography, Feb 12-14, 2002, Paris, France. Berlin, Germany: Springer-Verlag, 2002: 80-98
7. An J H, Dodis Y, Rabin T. On the security of joint signature and encryption. Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques, Apr 28-May 2, 2002, Amsterdam, The Netherlands. Berlin, Germany: Springer-Verlag, 2002: 83-107
8. Dodis Y, Freedman M J, Jarecki S, et al. Versatile padding schemes for joint signature and encryption. Proceedings of the 11th ACM Conference on Computer and Communications Secuirty, Oct 25-29, 2004, Washington, DC, USA. New York, NY, USA: ACM, 2004: 344-353.
9. Petersen H, Michels M. Cryptanalysis and improvement of signcryption schemes. IEE Proceedings: Computers and Digital Techniques, 1998, 145(2): 149-151
10. Pieprzyk J, Pointcheval D. Parallel authentication and public- key encryption. Proceedings of 8th Australasian Conference on Information Security and Privacy, Jul 9-11, 2003, Wollongong, Australia. Berlin, Germany: Springer-Verlag, 2003: 383-401
11. Mu Y, Varadharajan V. Distributed signcryption. 1st International Conference on Cryptology in India. Dec 10-13, 2000, Caleutta, India. Berlin, Germany: Springer-Verlag, 2000: 155-164
12. Kwak Jin Dong, Moon Sang Jae. Efficient distributed digncryption scheme as group signcryption. Proceedings of 1st International Conference on Applied Cryptography and Network Security, Oct 16-19, 2003, Kumming, China. Berlin, Germany: Springer-Verlag, 2003: 403-417
13. Zhang F, Safavi-Naini R, Susilo W. An Efficient Signature Scheme from Bilinear Pairings and Its Applications. Proceedings of International workshop on Practice and Theory in Public Key Cryptography, Mar 1-4, 2004, Singapore. Berlin, Germany: Springer-Verlag, 2004: 277-290
14. Goldwasser S, Micali S. Probabilistic encryption. Journal of Computer and System Sciences, 1984, 28 (2): 270-299
15. Brickell E, Pointcheval D, Vaudenay S, et al. Design validations for discrete logarithm based signature schemes. Proceedings of 3rd International workshop on practice and Theory in Public Key Cryptography, Jan 18-20, 2000, Victoria, Australia. Berlin, Germany: Springer-Verlag, 2000: 276-292
16. Pieprzyk J, Pointcheval D. Parallel authentication and Public- Key Encryption. Proceedings of 8th Australasian Conference on Information Security and Privacy, Jul 9-11, 2003, Wollongong, Australia. Berlin, Germany: Springer-Verlag, 2003: 383-401
17. Pointcheval D, Stern J. Security proofs for signature schemes. Proceedings of 13th Annual EUROCRYPT Conference on the Theory and Applications of Cryptologic Techniques, May 12-16, 1996, Zaragozt, Spain. Berlin, Germany: Springer-Verlag, 1996: 387-398
18. Rackhoff C, Simon D R. Non interactive zero-knowledge proof of knowledge and chosen ciphertext attack. Proceedings of 11th Annual International Cryptology Conference, Aug 11-15, 1992, Santa Barbara, CA. USA. Berlin, Germany: Springer-Verlag, 1992: 434-444
19. Boneh D, Lynn B, Shacham H. Short signatures from the Weil pairing. Proceedings of 7th Annual International Conference on the Theory and Applications of Cryptology and Information Security, Dec 9-13, 2001, Gold Coast, Australia. Berlin, Germany: Springer-Verlag, 2001: 514-532
|