1. Baek, J., Steinfeld, R., & Zheng, Y. (2002). Formal proofs for the security of signcryption, Public Key Cryptography-PKC 2002, LNCS 2274, Springer, pp. 80–98.
2. Bao, F., & Deng, R. H. (1998). A signcryption scheme with signature directly verifiable by public key, Public Key Cryptography-PKC’98, LNCS 1431, Springer, pp. 55–59.
3. Barreto, P. S. L. M., Libert, B., McCullagh, N., & Quisquater, J. J. (2005). Efficient and provably-secure identity-based signatures and signcrypti on from bilinear maps. Advances in Cryptology-ASIACRYPT 2005, LNCS 3788, Springer, pp. 515–532.
4. Chen L., & Malone-Lee J. (2005). Improved identity-based signcryption. Public Key Cryptography-PKC 2005, LNCS 3386, Springer, pp. 362–379.
5. Chen, J., Chen, K., Wang, Y., et al. (2012). Identity-based key-insulated signcryption. Informatica, 23, 27–45.