참고문헌
- A. Shamir, 'Identity-based cryptosystems and signature schemes,' in Proc. Advances in Cryptology-Crypto'84, Lecture Notes in Computer Science 196, Aug. 1984, pp. 47-53
- S. S. Al-Riyami and K. G. Paterson, 'Certificateless public key cryptography,' in Proc. Advances in Cryptography-Asiacrypt2003, Lecture Notes in Computer Science 2894, Dec. 2003, pp. 452-473
- Z. F. Zhang, D. S.Wong, J. Xu, and D. G. Feng, 'Certificateless public-key signature: Security model and efficient construction,' in Proc. ACNS2006, Lecture Notes in Computer Science 3989, June 2006, pp. 293-308
- S. S. Al-Riyami and K. G. Paterson, 'CBE from CLPKE: A generic construction and efficient schemes,' in Proc. Public Key Cryptography, PKC2005, Lecture Notes in Computer Science 3386, Jan. 2005, pp. 398- 415
- J. Baek, R. Safavi-Naini, and W. Susilo,'Certificateless public key encryption without pairing,' in Proc. 8th Information Security Conference, ISC2005, Lecture Notes in Computer Science 3650, Sept. 2005, pp. 134- 148
- D. H. Yum and P. J. Lee,'Generic construction of certificateless encryption,' in Proc. ICCSA2004, Lecture Notes in Computer Science 3043, May 2004, pp. 802-811
- Z. Cheng and R. Comley, 'Efficient certificateless public key encryption,' Cryptology ePrint Archive. [Online]. Available: http://eprint.iacr.org/2005/012
- D. H. Yum and P. J. Lee, 'Generic construction of certificateless signature,' in Proc. Information Security and Privacy, ACISP2004, Lecture Notes in Computer Science 3108, July 2004, pp. 200-211
- W. S. Yap, S. H. Heng, and B. M. Goi, 'An efficient certificateless signature scheme,' in Proc. EUC Workshops2006, Lecture Notes in Computer Science 4097, Aug. 2006, pp. 322-331
- L. C. Wang, Z. F. Cao, X. X. Li, and H. F. Qian, 'Certificateless threshold signature schemes,' in Proc. CIS2005, Lecture Notes in Artifical Intelligence 3802, Dec. 2005, pp. 104-109
- X. Y. Huang, W. Susilo, Y. Mu, and F. T. Zhang, 'On the security of certificateless signature schemes from asiacrypt 2003,' in Proc. CANS2005, Lecture Notes in Computer Science 3810, Dec. 2005, pp. 13-25
- B. C. Hu, D. S. Wong, Z. F. Zhang, and X. T. Deng, 'Key replacement attack against a generic construction of certificateless signature,' in Proc. ACISP2006, Lecture Notes in Computer Science 4058, July 2006, pp. 235-246
- M. Bellare and P. Rogaway, 'Random oracles are practical: A paradigm for designing efficient protocols,' in Proc. ACM CCS'93, Nov. 1993, pp. 62-73
- D. Pointcheval and J. Stern, 'Security proofs for signature schemes,' in Proc. Advanced in Cryptology-Eurocrypt'96, Lecture Notes in Computer Science 1070, 1996, pp. 387-398
- D. Boneh, B. Lynn and H. Shacham, 'Short signatures from the weil pairing,' in Proc. Advances in Cryptology - Asiacrypt2001, Lecture Notes in Computer Science 2248, Dec. 2001, pp. 514-532
- J.S. Coron, 'On the exact security of full domain hash,' in Proc. Advances in Cryptology- Crypto2000, Lecture Notes in Computer Science 1880, Aug. 2000, pp. 229-235
- X. Y. Huang, Y. Mu, W. Susilo, D. S. Wong, and W. Wu, 'Certificateless signature revisited,' in Proc. ACISP2007, Lecture Notes in Computer Science 4586, July 2007, pp. 308-322
- Z. F. Zhang, and D. G. Feng, 'Key replacement attack on a certificateless signature scheme,' Cryptology ePrint Archive. [Online]. Available: http//eprint.iacr.org/2006/453