References
- A. Shamir, "Identity-based cryptosystems and signature schemes," in Proc. of Crypto'1984, pp. 47-53, Aug 19-22, 1984.
- R. L. Rivest, A. Shamir and Y. Tauman, "How to leak a secret," in Proc. of AsiaCrypt'2001, pp. 552-565, Dec 9-13, 2001.
- J. Y. Hwang, L. Q. Chen and H. S. Cho, "Short dynamic group signature scheme supporting controllable linkability," IEEE Transactions on Information Forensics and Security, vol. 10, no. 6, pp. 1109-1124, 2015. https://doi.org/10.1109/TIFS.2015.2390497
- J. K. Liu, V. K. Wei and D. S. Wong, "Linkable spontaneous anonymous group signature for Ad Hoc groups (extended abstract)," in Proc. of ACISP'2004, pp. 325-335, Jul 13-15, 2004.
- S. S. M. Chow, J. K. Liu and D. S. Wong, "Robust receipt-free election system with ballot secrecy and verifiability," in Proc. of NDSS'2008, pp. 81-94, Feb 8-11, 2008.
- H. Xiong, Z. Chen and F. G. Li, "Bibber-anonymous english auction protocol based on revocable ring signature," Expert Systems with Applications, vol. 39, no. 8, pp. 7062-7066, 2012. https://doi.org/10.1016/j.eswa.2012.01.040
- L. Chen, C. Kudla and K. Paterson, "Concurrent signatures," in Proc. of EuroCrypt'2004, pp. 287-305, May 2-6, 2004.
- F. Laguillaumie and D. Vergnaud, "Multi-designated verifiers signatures," in Proc. of ICICS' 2004, pp. 495-507, Oct 27-29, 2004.
- X. Y. Huang, W. Susilo, Y. Mu and F. T. Zhang, "Identity-based ring signcryption schemes: cryptographic primitives for preserving privacy and authenticity in the ubiquitous world," in Proc. of AINA'2005, pp. 649-654, Mar 28-30, 2005.
- S. Haber and B. Pinkas, "Securely combining public-key cryptosystems," in Proc. of CCS'2001, pp. 215-224, Nov 6-8, 2001.
- Y. L. Han, X. Y. Yang, P. Wei, Y. M. Wang and Y. P. Hu, "ECGSC: elliptic curve based generalized signcryption," in Proc. of UIC 2006, pp. 956-965, Sep 3-6, 2006.
- J. S. Coron, M. Joye, D. Naccache and P. Paillier, "Universal padding schemes for RSA," in Proc. of Crypto'2002, pp. 226-241, Aug 18-22, 2002.
- M. Bellare and P. Rogaway, "The exact security of digital signatures - How to sign with RSA and Rabin," in Proc. of EuroCrypt'1996, pp. 399-416, May 12-16, 1996.
- Y. C. Komano and K. Ohta, "Efficient universal padding techniques for multiplicative trapdoor one-way permutation," in Proc. of Crypto'2003, pp. 366-382, Aug 17-21, 2003.
- M. I. G. Vasco, F. Hess and R. Steinwandt, "Combined (identity-based) public key schemes," Cryptology ePrint Archive, Report 2008/466 (2008). Available at http://eprint.iacr.org/ 2008/466 [Accessed on 3 Feb 2009].
- K. G. Paterson, J. C. N. Schuldt, M. Stam and S. Thomson, "On the joint security of encryption and signature, revisited," in Proc. of AsiaCrypt'2011, pp. 161-178, Dec 4-8, 2011.
- J. P. Degabriele, A. Lehmann and K. G. Paterson, "On the joint security of encryption and signature in EMV," in Proc. of CT-RSA'2012, pp. 116-135, Feb 27-Mar 2, 2012.
- C. Chen, J. Chen, H.W. Lim Z. F. Zhang and D. G. Feng, "Combined public-key schemes: the case of ABE and ABS," in Proc. of ProvSec 2012, pp. 53-69, Sep 26-28, 2012.
- M. Bellare, S. Meiklejohn and S. Thomson, "Key-versatile signatures and applications: RKA, KDM and joint enc/sig," in Proc. of EuroCrypt'2014, pp. 496-513, May 11-15, 2014.
- X. A. Wang, X. Y. Yang and Y. L. Han, "Provable secure generalized signcryption," Cryptology ePrint Archive, Report 2007/173 (2007). Available at http://eprint.iacr.org/2007/173 [Accessed on 21 May 2008].
- S. Lal and P. Kushwah, "ID based generalized signcryption," Cryptology ePrint Archive, Report 2008/084 (2008). Available at http://eprint.iacr.org/2008/084 [Accessed on 26 Feb 2008].
- G. Yu, X. X.Ma, Y. Shen and W. B. Han, "Provable secure identity based generalized signcryption scheme," Theoretical Compute Science, vol. 411, no. 40-42, pp. 3614-3624, 2010. https://doi.org/10.1016/j.tcs.2010.06.003
- P. Kushwah and S. Lal, "Efficient generalized signcryption schemes," Cryptology ePrint Archive, Report 2010/346 (2010). Available at http://eprint.iacr.org/2010/346 [Accessed on 16 Jun 2010].
- Y. L. Han and X. L. Gui, "Adaptive secure multicast in wireless networks," International Journal of Communication Systems, vol. 22, no. 9, pp. 1213-1239, 2009. https://doi.org/10.1002/dac.1023
- H. F. Ji, W. B. Han and L. Zhao, "Certificateless generalized signcryption," Cryptology ePrint Archive, Report 2010/204 (2010). Available at http://eprint.iacr.org/2010/204 [accessed on 19 Apr 2010].
- C. X. Zhou, W. Zhou and X.W. Dong, "Provable certificateless generalized signcryption scheme," Designs, Codes and Cryptography, vol. 71, no. 2, pp. 331-346, 2014. https://doi.org/10.1007/s10623-012-9734-y
- G. Wei, J. Shao, Y. Xiang, P. P. Zhu, and R. X. Lu, "Obtain confidentiality or/and authenticity in big data by id-based generalized signcryption," Information Sciences, vol. 318, pp. 111-122, 2015. https://doi.org/10.1016/j.ins.2014.05.034
- C. X. Zhou, "An improved multi-receiver generalized signcryption scheme," International Journal of Network Security, vol. 17, no. 3, pp. 340-350, 2015.
- Y. L. Han, Y. C. Bai, D. Y. Fang and X. Y. Yang, "The new attribute-based generalized signcryption scheme," in Proc. of ICYCSEE'2015, pp. 353-360, 2015.
- M. Abe, M. Ohkubo, and K. Suzuki, "1-out-of-n signatures from a variety of keys," in Proc. of AsiaCrypt'2002, pp.415-432, Dec 1-5, 2002.
- J. Q. Lv and X. M. Wang, "Verifiable ring signature," in Proc. of DMS'2003, pp. 663-667, Sep, 2003.
- J. K. Liu, V. K. Wei, and D. S. Wong, "Linkable spontaneous anonymous group signature for ad hoc groups (extended abstract)," in Proc. of ACISP, pp. 325-335, Jul. 13-15, 2004.
- J. K. Liu and D. S.Wong, "On the security models of (Threshold) ring signature schemes," in Proc. of ICISC, pp. 204-217, Dec. 2-3, 2004.
- J. Herranz and G. Saez, "New identity-based ring signature schemes," in Proc. of ICICS'2004, pp. 27-39, Oct 27-29, 2004.
- A. Bender, J. Katz and R. Morselli, "Ring signatures: stronger definitions, and constructions without random oracles," in Proc. of TCC, pp. 60-79, Mar. 4-7, 2006.
- M. H. Au, J. K. Liu, W. Susilo and J. Y. Zhou, "Realizing fully secure unrestricted ID-based ring signature in the standard model based on HIBE," IEEE Transactions on Information Forensics and Security, vol. 8, no. 12, pp. 1909-1922, 2013. https://doi.org/10.1109/TIFS.2013.2282908
- L. Z. Deng, "Certificateless ring signature based on RSA problem and DL problem," RAIRO-Theoretical Informatics and Applications, vol. 49, no. 4, pp. 307-318, 2015. https://doi.org/10.1051/ita/2016013
- M. R. Asaar, M. Salmasizadeh andW. Susilo, "A short identity-based proxy ring signature scheme from RSA," Computer Standards & Interfaces, vol. 38, pp. 144-151, 2015. https://doi.org/10.1016/j.csi.2014.10.002
- M. H. Au and W. Susilo, "Two-party (blind) ring signatures and their applications," in Proc. of ISPEC, pp. 403-417, May 5-8, 2014.
- L. J. Zhu and F. T. Zhang, "Efficient id-based ring signature and ring signcryption schemes," in Proc. of CIS'2008, pp. 303-307, Dec 13-17, 2008.
- M. W. Zhang, B. Yang, S. L. Zhu and W. Z. Zhang, "Efficient secret authenticatable anonymous signcryption scheme with identity privacy," in Proc. of ISI 2008, pp.126-137, Jun. 17, 2008.
- F. G. Li, S. Masaaki and T. Tsuyoshi, "Analysis and improvement of authenticatable ring signcryption scheme," Journal of Shanghai Jiaotong University (Science), vol. 13, no. 6, pp. 679-683, 2008. https://doi.org/10.1007/s12204-008-0679-2
- J. H. Zhang, S. N. Gao, H. Chen and Q. Geng, "A novel ID-based anonymous signcryption scheme," in Proc. of APWeb/WAIM 2009, pp. 604-610, Apr 2-4, 2009.
- L. Z. Deng, J. W. Zeng and S. W. Li, "A new identity-based ring signcryption scheme," International Journal of Electronic Security and Digital Forensics, vol. 6, no. 4, pp. 333-342, 2014. https://doi.org/10.1504/IJESDF.2014.065736
- H. Sun, "Efficient certificateless ring signcryption in the standard model," Journal of Computational Information Systems, vol. 10, no. 8, pp. 3181-3188, 2014.
- Z. Z. Guo, M. C. Li and X. X. Fan, "Attribute-based ring signcryption scheme," Security and Communication Networks, vol. 6, no. 6, pp. 790-796, 2013. https://doi.org/10.1002/sec.614
- L. Z. Deng, S. W. Li and Y. F. Yu, "Identity-based threshold ring signcryption from pairing," International Journal of Electronic Security and Digital Forensics, vol. 6, no. 2, pp. 90-103, 2014. https://doi.org/10.1504/IJESDF.2014.063093
- M. Barbosa and P. Farshim, "Certificateless signcryption," in Proc. of ASIACCS'2008, pp. 369-372, Mar 18-20, 2008.
- S. S. M. Chow, S. M. Yiu and L. C. K. Hui, "Efficient identity based ring signature," in Proc. of ACNS 2005, pp. 499-512, Jun 7-10, 2005.
- PBC library. http://crypto.stanford.edu/pbc.
- J. W. Liu, Z. H. Zhang, X. F. Chen and K. S. Kwak, "Certificateless remote anonymous authentication schemes for wireless body area networks," IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 2, pp. 332-342, 2014. https://doi.org/10.1109/TPDS.2013.145
- C. J. Wang and J. Liu, "Attribute-based ring signcryption scheme and its application in wireless body area networks," in Proc. of ICA3PP 2015, pp. 521-530, Nov 18-20, 2015.
피인용 문헌
- Certificateless Key-Insulated Generalized Signcryption Scheme without Bilinear Pairings vol.2017, pp.None, 2017, https://doi.org/10.1155/2017/8405879
- Certificate-Based Generalized Ring Signcryption Scheme vol.29, pp.6, 2018, https://doi.org/10.1142/s0129054118500211