1. Zheng Y (1997) Digital signcryption or how to achieve cost (signature and Encryption)<< cost (signature) + cost (encryption), In: Proceedings of advances in CRYPTO’97, LNCS 1294. Springer, Berlin, pp 165–179
2. Bao F, Deng RH (1997) A signcryption scheme with signature directly verifiable by public key. In: PKC’98, LNCS, vol 1431. Springer, Berlin, pp 55–59
3. Chow SSM, Yiu SM, Hui LCK, Chow KP (2004) Efficient forward and provably secure ID-based signcryption scheme with public verifiability and public ciphertext authenticity. In: ICISC’03, LNCS, vol 2971. Springer, Berlin, pp 352–269
4. Boyen X (2003) Multipurpose identity based signcryption: a swiss army knife for identity based cryptography. In: CRYPT’03, LNCS, vol 2729. Springer, Berlin, pp 383–399
5. Mu Y, Varadharajan V (2000) Distributed signcryption. In: INDOCRYPT’00, LNCS, vol 1977. Springer, Berlin, pp 155–164