1. Shamir A.: Identity-based cryptosystems and signature schemes. In: CRYPTO’84. Lecture Notes in Computer Science, vol. 196, pp. 47–53. Springer, Heidelberg (1984).
2. Al-Riyami S.S., Paterson K.G.: Certificateless public key cryptography. In: Proceedings of ASIACRYPT 2003. Lecture Notes in Computer Science, vol. 2894, pp. 452–473. Springer, Heidelberg (2003).
3. Zheng Y.L.: Digital signcryption or how to achieve cost (Signature & Encryption) Cost (Signature) + Cost (Encryption). In: CRYPTO’97. Lecture Notes in Computer Science, vol. 1294, pp. 165–179. Springer, Heidelberg (1997).
4. Barbosa M., Farshim P.: Certificateless signcryption. In: Proceedings of ASIACCS’2008, pp. 369–372. ACM, New York (2008).
5. Han Y.L., Yang X.Y., Wei P., et al.: ECGSC: elliptic curve based generalized signcryption. In: The 3rd International Conference on Ubiquitous Intelligence and Computing (UIC-2006). Lecture Notes in Computer Science, vol. 4159, pp. 956–965. Springer, Heidelberg (2006).