Author:
Yuan Wei,Hu Liang,Li Hongtu,Chu Jianfeng
Reference32 articles.
1. Zheng Y (1997) Digital signcryption or how to achieve cost (signature and encryption) << cost (signature) + cost (encryption). In: Proceedings of advances in CRYPTO’97. LNCS, vol 1294. Springer, Berlin, pp 165–179
2. Bao F, Deng RH (1997) A signcryption scheme with signature directly verifiable by public key. PKC’98. LNCS, vol 1431. Springer, Berlin, pp 55–59
3. Chow SSM, Yiu SM, Hui LCK, Chow KP (2004) Efficient forward and provably secure ID-based signcryption scheme with public verifiability and public ciphertext authenticity. ICISC’03. LNCS, vol 2971. Springer, Berlin, pp 269–352
4. Boyen X (2003) Multipurpose identity based signcryption: a swiss army knife for identity based cryptography. CRYPT’03. LNCS, vol 2729. Springer, Berlin, pp 383–399
5. Mu Y, Varadharajan V (2000) Distributed signcryption. INDOCRYPT’00. LNCS, vol 1977. Springer, Berlin, pp 155–164