References
- D. Boneh et al., "Aggregate and Verifiably Encrypted Signatures from Bilinear Maps," EUROCRYPT, LNCS, vol. 2656, 2003, pp. 416-432.
-
Y.L. Zheng, "Digital Signcryption or How to Achieve Cost (Signature&Encryption)<
- A. Shamir, "Identity-Based Cryptosystem and Signature Schemes," Proc. CRYPTO'84 Adv. Cryptology, LNCS, vol. 196, 1985, pp. 47-53.
- J. Malone-Lee, "Identity-Based Signcryption," Cryptology ePrint Archive, Report 2002/098. http://eprint.iacr.org/2002/098
- S.S.D. Selvi et al., "Provably Secure ID-Based Broadcast Signcryption (IBBSC) Scheme," Cryptology ePrint Archive, Report 2008/225. http://eprint.iacr.org/2008/225
- M.G. Muniz and P. Laud, "Strong Forward Security in Identity- Based Signcryption," Cryptology ePrint Archive, Report 2011/156. http://eprint.iacr.org/2011/156
- C. Gentry and Z. Ramzan, "Identity-Based Aggregate Signatures," Public Key Cryptography, LNCS, vol. 3958, 2006, pp. 257-273.
- S.S.D. Selvi et al., "Security Analysis of Aggregate Signature and Batch Verification Signature Schemes," Cryptology ePrint Archive, Report 2009/290. http://eprint.iacr.org/2009/290
- S.S.D. Selvi et al., "Efficient and Provably Secure Identity Based Aggregate Signature Schemes with Partial and Full Aggregation," Cryptology ePrint Archive, Report 2010/461. http://eprint.iacr.org/2010/461
- S.-H. Seo et al., "Identity-Based Universal Designated Multi- Verifiers Signature Schemes," Comput. Stand. Interfaces, vol. 30, no. 5, 2008, pp. 288-295. https://doi.org/10.1016/j.csi.2007.08.020
- Z. Wang et al., "Practical Identity-Based Aggregate Signature from Bilinear Maps," J. Sci. Shanghai Jiao Tong University, vol. 13, no. 6, 2008, pp. 684-687. https://doi.org/10.1007/s12204-008-0684-5
- Y. Wen and J. Ma, "An Aggregate Signature Scheme with Constant Pairing Operations," CSSE, vol. 3, 2008, pp 830-833.
- S.S.D. Selvi et al., "Identity Based Aggregate Signcryption Schemes," INDOCRYPT, LNCS, vol. 5922, 2009, pp. 378-397.
- Zheng-hua Qi et al., "An ID-Based Ring Signcryption Scheme for Wireless Sensor Networks," IET Int. Conf. Wireless Sensor Netw., Beijing, China, Nov. 2010, pp. 368-373.
- D. Boneh and M. Franklin, "Identity-Based Encryption from the Weil Pairing," SIAM J. Comput., vol. 32, no. 3, 2003, pp. 586- 615. https://doi.org/10.1137/S0097539701398521
- B. Lynn, "On the Implementation of Pairing-Based Cryptosystems," PhD thesis, Stanford, 2008.
Cited by
- ID-Based Optimistic Fair Exchange Scheme Based on RSA vol.36, pp.4, 2012, https://doi.org/10.4218/etrij.14.0113.0351
- An Obfuscatable Aggregatable Signcryption Scheme for Unattended Devices in IoT Systems vol.4, pp.4, 2017, https://doi.org/10.1109/jiot.2017.2677977
- Efficient and Privacy-Preserving Data Aggregation Scheme for Smart Grid Against Internal Adversaries vol.8, pp.5, 2012, https://doi.org/10.1109/tsg.2017.2720159
- Pairing free identity based aggregate signcryption scheme vol.14, pp.6, 2012, https://doi.org/10.1049/iet-ifs.2019.0579