JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE) ›› 2020, Vol. 55 ›› Issue (3): 51-57.doi: 10.6040/j.issn.1671-9352.2.2019.177
CLC Number:
[1] ZHENG Yuliang. Digital signcryption or how to achieve cost(signature & encryption)≪cost(signature)+cost(encryption)[C] // Proc of the 17th Annual International Cryptology Conference. California: Springer-Verlag, 1997: 165-179. [2] SHAMIR A. Identity-based cryptosystems and signature schemes[C] // Workshop on the Theory and Application of Cryptographic Techniques. Berlin: Springer, 1984: 47-53. [3] Al-RIYAMI S S, PATERSON K G. Certificateless public key cryptography[C] // International Conference on the Theory and Application of Cryptology and Information Security. Berlin: Springer, 2003: 452-473. [4] 张福泰, 孙银霞, 张磊,等. 无证书公钥密码体制研究[J]. 软件学报, 2011, 22(6):1316-1332. ZHANG Futai, SUN Yinxia, ZHANG Lei, et al. Research on certificateless public key cryptography[J]. Journal of Software, 2011, 22(6):1316-1332. [5] 侯红霞,张雪锋,董晓丽. 改进的无证书聚合签名方案[J]. 山东大学学报(理学版), 2013, 48(9):29-34. HOU Hongxia, ZHANG Xuefeng, DONG Xiaoli. Improved certificateless aggregate signature scheme[J]. Journal of Shandong University(Natural Science), 2013, 48(9):29-34. [6] 杨珺涵, 曹天杰. 标准模型下基于无证书密钥封装的口令认证密钥交换协议[J]. 山东大学学报(工学版), 2013, 43(2):11-17. YANG Junhan, CAO Tianjie. Password-authenticated key exchange protocol based on certificateless key encapsulation in the standard model[J]. Journal of Shandong University(Engineering Science), 2013, 43(2):11-17. [7] 杜瑞颖, 刘亚斌, 刘建东, 等. 无证书密钥隔离签名方案[J]. 山东大学学报(理学版), 2014, 49(9):24-28. DU Ruiying, LIU Yabin, LIU Jiandong, et al. A certificateless key-insulated signature scheme[J]. Journal of Shandong University(Natural Science), 2014, 49(9):24-28. [8] 樊爱宛, 夏栋梁, 杨照峰. 两种无证书聚合签名方案的安全性分析及改进[J]. 山东大学学报(理学版), 2015, 50(9):42-48. FAN Aiwan, XIA Dongliang, YANG Zhaofeng. Security analysis and improvement of two certificateless aggregate signature schemes[J]. Journal of Shandong University(Natural Science), 2015, 50(9):42-48. [9] BARBOSA M, FARSHIM P. Certificateless signcryption[C] // Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security. New York: ACM, 2008: 369-372. [10] WU Chenhuang, CHEN Zhixiong. A new efficient certificateless signcryption scheme[C] // Proceedings of the Information Science and Engineering, International Symposium on IEEE, New York: IEEE, 2008: 661-664. [11] LI F G, SHIRASE M, TAKAGI T. Certificateless hybrid signcryption[M] // Information Security Practice and Experience. Berlin: Springer, 2009: 112-123. [12] BARRETO P S L M, DEUSAJUTE A M, DE E, et al. Toward efficient certificateless signcryption from(and without)bilinear pairings[C] // VIII Simpósio Brasileiro em Segurança da Informação e de Sistemas Computacionais. New York: IEEE, 2008. [13] 朱辉, 李晖, 王育民. 不使用双线性对的无证书签密方案[J]. 计算机研究与发展, 2010, 47(9):1587-1594. ZHU Hui, LI Hui, WANG Yunming. Certificateless signcryption scheme without pairing[J]. Journal of Computer Research and Development, 2010, 47(9):1587-1594. [14] SELVI S S D, VIVEK S S, RANGAN C P. Cryptanalysis of certificateless signcryption schemes and an efficient construction without pairing[M] // Information Security and Cryptology. Berlin: Springer, 2010: 75-92. [15] SHI W B, KUMAR N, GONG P, et al. Cryptanalysis and improvement of a certificateless signcryption scheme without bilinear pairing[J]. Frontiers of Computer Science, 2014, 8(4):656-666. [16] 赵振国. 无证书签密机制的安全性分析与改进[J]. 通信学报, 2015, 36(3):125-130. ZHAO Zhenguo. Security analysis and improvement of a certificateless signcryption scheme[J]. Journal on Communications, 2015, 36(3):125-130. [17] 周彦伟, 杨波, 张文政. 不使用双线性映射的无证书签密方案的安全性分析及改进[J]. 计算机学报, 2016, 39(6):1257-1266. ZHOU Yanwei, YANG Bo, ZHANG Wenzheng. Security analysis and improvement of certificateless signcryption scheme without bilinear pairing[J]. Chinese Journal of Computers, 2016, 39(6):1257-1266. |
[1] | ZUO Li-ming, CHEN Lan-lan, ZHOU Qing. A certificate-based short signature scheme [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2019, 54(1): 79-87. |
[2] | FAN Ai-wan, XIA Dong-liang, YANG Zhao-feng. Security analysis and improvement of two certificateless aggregate signature schemes [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2015, 50(09): 42-48. |
[3] | YAN Zhao-xiang. Chosen cipher-text security proof of ZS encryption scheme [J]. J4, 2010, 45(11): 115-121. |
|