1 |
J. H. Zhang, S. N. Gao, H. Chen and Q. Geng, "A novel ID-based anonymous signcryption scheme," in Proc. of APWeb/WAIM 2009, pp. 604-610, Apr 2-4, 2009.
|
2 |
L. Z. Deng, J. W. Zeng and S. W. Li, "A new identity-based ring signcryption scheme," International Journal of Electronic Security and Digital Forensics, vol. 6, no. 4, pp. 333-342, 2014.
DOI
|
3 |
H. Sun, "Efficient certificateless ring signcryption in the standard model," Journal of Computational Information Systems, vol. 10, no. 8, pp. 3181-3188, 2014.
|
4 |
Z. Z. Guo, M. C. Li and X. X. Fan, "Attribute-based ring signcryption scheme," Security and Communication Networks, vol. 6, no. 6, pp. 790-796, 2013.
DOI
|
5 |
L. Z. Deng, S. W. Li and Y. F. Yu, "Identity-based threshold ring signcryption from pairing," International Journal of Electronic Security and Digital Forensics, vol. 6, no. 2, pp. 90-103, 2014.
DOI
|
6 |
M. Barbosa and P. Farshim, "Certificateless signcryption," in Proc. of ASIACCS'2008, pp. 369-372, Mar 18-20, 2008.
|
7 |
S. S. M. Chow, S. M. Yiu and L. C. K. Hui, "Efficient identity based ring signature," in Proc. of ACNS 2005, pp. 499-512, Jun 7-10, 2005.
|
8 |
PBC library. http://crypto.stanford.edu/pbc.
|
9 |
J. W. Liu, Z. H. Zhang, X. F. Chen and K. S. Kwak, "Certificateless remote anonymous authentication schemes for wireless body area networks," IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 2, pp. 332-342, 2014.
DOI
|
10 |
C. J. Wang and J. Liu, "Attribute-based ring signcryption scheme and its application in wireless body area networks," in Proc. of ICA3PP 2015, pp. 521-530, Nov 18-20, 2015.
|
11 |
S. S. M. Chow, J. K. Liu and D. S. Wong, "Robust receipt-free election system with ballot secrecy and verifiability," in Proc. of NDSS'2008, pp. 81-94, Feb 8-11, 2008.
|
12 |
R. L. Rivest, A. Shamir and Y. Tauman, "How to leak a secret," in Proc. of AsiaCrypt'2001, pp. 552-565, Dec 9-13, 2001.
|
13 |
J. Y. Hwang, L. Q. Chen and H. S. Cho, "Short dynamic group signature scheme supporting controllable linkability," IEEE Transactions on Information Forensics and Security, vol. 10, no. 6, pp. 1109-1124, 2015.
DOI
|
14 |
J. K. Liu, V. K. Wei and D. S. Wong, "Linkable spontaneous anonymous group signature for Ad Hoc groups (extended abstract)," in Proc. of ACISP'2004, pp. 325-335, Jul 13-15, 2004.
|
15 |
H. Xiong, Z. Chen and F. G. Li, "Bibber-anonymous english auction protocol based on revocable ring signature," Expert Systems with Applications, vol. 39, no. 8, pp. 7062-7066, 2012.
DOI
|
16 |
L. Chen, C. Kudla and K. Paterson, "Concurrent signatures," in Proc. of EuroCrypt'2004, pp. 287-305, May 2-6, 2004.
|
17 |
F. Laguillaumie and D. Vergnaud, "Multi-designated verifiers signatures," in Proc. of ICICS' 2004, pp. 495-507, Oct 27-29, 2004.
|
18 |
X. Y. Huang, W. Susilo, Y. Mu and F. T. Zhang, "Identity-based ring signcryption schemes: cryptographic primitives for preserving privacy and authenticity in the ubiquitous world," in Proc. of AINA'2005, pp. 649-654, Mar 28-30, 2005.
|
19 |
A. Shamir, "Identity-based cryptosystems and signature schemes," in Proc. of Crypto'1984, pp. 47-53, Aug 19-22, 1984.
|
20 |
S. Haber and B. Pinkas, "Securely combining public-key cryptosystems," in Proc. of CCS'2001, pp. 215-224, Nov 6-8, 2001.
|
21 |
Y. L. Han, X. Y. Yang, P. Wei, Y. M. Wang and Y. P. Hu, "ECGSC: elliptic curve based generalized signcryption," in Proc. of UIC 2006, pp. 956-965, Sep 3-6, 2006.
|
22 |
M. I. G. Vasco, F. Hess and R. Steinwandt, "Combined (identity-based) public key schemes," Cryptology ePrint Archive, Report 2008/466 (2008). Available at http://eprint.iacr.org/ 2008/466 [Accessed on 3 Feb 2009].
|
23 |
J. S. Coron, M. Joye, D. Naccache and P. Paillier, "Universal padding schemes for RSA," in Proc. of Crypto'2002, pp. 226-241, Aug 18-22, 2002.
|
24 |
M. Bellare and P. Rogaway, "The exact security of digital signatures - How to sign with RSA and Rabin," in Proc. of EuroCrypt'1996, pp. 399-416, May 12-16, 1996.
|
25 |
Y. C. Komano and K. Ohta, "Efficient universal padding techniques for multiplicative trapdoor one-way permutation," in Proc. of Crypto'2003, pp. 366-382, Aug 17-21, 2003.
|
26 |
K. G. Paterson, J. C. N. Schuldt, M. Stam and S. Thomson, "On the joint security of encryption and signature, revisited," in Proc. of AsiaCrypt'2011, pp. 161-178, Dec 4-8, 2011.
|
27 |
J. P. Degabriele, A. Lehmann and K. G. Paterson, "On the joint security of encryption and signature in EMV," in Proc. of CT-RSA'2012, pp. 116-135, Feb 27-Mar 2, 2012.
|
28 |
C. Chen, J. Chen, H.W. Lim Z. F. Zhang and D. G. Feng, "Combined public-key schemes: the case of ABE and ABS," in Proc. of ProvSec 2012, pp. 53-69, Sep 26-28, 2012.
|
29 |
X. A. Wang, X. Y. Yang and Y. L. Han, "Provable secure generalized signcryption," Cryptology ePrint Archive, Report 2007/173 (2007). Available at http://eprint.iacr.org/2007/173 [Accessed on 21 May 2008].
|
30 |
M. Bellare, S. Meiklejohn and S. Thomson, "Key-versatile signatures and applications: RKA, KDM and joint enc/sig," in Proc. of EuroCrypt'2014, pp. 496-513, May 11-15, 2014.
|
31 |
S. Lal and P. Kushwah, "ID based generalized signcryption," Cryptology ePrint Archive, Report 2008/084 (2008). Available at http://eprint.iacr.org/2008/084 [Accessed on 26 Feb 2008].
|
32 |
H. F. Ji, W. B. Han and L. Zhao, "Certificateless generalized signcryption," Cryptology ePrint Archive, Report 2010/204 (2010). Available at http://eprint.iacr.org/2010/204 [accessed on 19 Apr 2010].
|
33 |
G. Yu, X. X.Ma, Y. Shen and W. B. Han, "Provable secure identity based generalized signcryption scheme," Theoretical Compute Science, vol. 411, no. 40-42, pp. 3614-3624, 2010.
DOI
|
34 |
P. Kushwah and S. Lal, "Efficient generalized signcryption schemes," Cryptology ePrint Archive, Report 2010/346 (2010). Available at http://eprint.iacr.org/2010/346 [Accessed on 16 Jun 2010].
|
35 |
Y. L. Han and X. L. Gui, "Adaptive secure multicast in wireless networks," International Journal of Communication Systems, vol. 22, no. 9, pp. 1213-1239, 2009.
DOI
|
36 |
C. X. Zhou, W. Zhou and X.W. Dong, "Provable certificateless generalized signcryption scheme," Designs, Codes and Cryptography, vol. 71, no. 2, pp. 331-346, 2014.
DOI
|
37 |
M. Abe, M. Ohkubo, and K. Suzuki, "1-out-of-n signatures from a variety of keys," in Proc. of AsiaCrypt'2002, pp.415-432, Dec 1-5, 2002.
|
38 |
G. Wei, J. Shao, Y. Xiang, P. P. Zhu, and R. X. Lu, "Obtain confidentiality or/and authenticity in big data by id-based generalized signcryption," Information Sciences, vol. 318, pp. 111-122, 2015.
DOI
|
39 |
C. X. Zhou, "An improved multi-receiver generalized signcryption scheme," International Journal of Network Security, vol. 17, no. 3, pp. 340-350, 2015.
|
40 |
Y. L. Han, Y. C. Bai, D. Y. Fang and X. Y. Yang, "The new attribute-based generalized signcryption scheme," in Proc. of ICYCSEE'2015, pp. 353-360, 2015.
|
41 |
J. Q. Lv and X. M. Wang, "Verifiable ring signature," in Proc. of DMS'2003, pp. 663-667, Sep, 2003.
|
42 |
J. K. Liu, V. K. Wei, and D. S. Wong, "Linkable spontaneous anonymous group signature for ad hoc groups (extended abstract)," in Proc. of ACISP, pp. 325-335, Jul. 13-15, 2004.
|
43 |
M. H. Au, J. K. Liu, W. Susilo and J. Y. Zhou, "Realizing fully secure unrestricted ID-based ring signature in the standard model based on HIBE," IEEE Transactions on Information Forensics and Security, vol. 8, no. 12, pp. 1909-1922, 2013.
DOI
|
44 |
J. K. Liu and D. S.Wong, "On the security models of (Threshold) ring signature schemes," in Proc. of ICISC, pp. 204-217, Dec. 2-3, 2004.
|
45 |
J. Herranz and G. Saez, "New identity-based ring signature schemes," in Proc. of ICICS'2004, pp. 27-39, Oct 27-29, 2004.
|
46 |
A. Bender, J. Katz and R. Morselli, "Ring signatures: stronger definitions, and constructions without random oracles," in Proc. of TCC, pp. 60-79, Mar. 4-7, 2006.
|
47 |
L. J. Zhu and F. T. Zhang, "Efficient id-based ring signature and ring signcryption schemes," in Proc. of CIS'2008, pp. 303-307, Dec 13-17, 2008.
|
48 |
L. Z. Deng, "Certificateless ring signature based on RSA problem and DL problem," RAIRO-Theoretical Informatics and Applications, vol. 49, no. 4, pp. 307-318, 2015.
DOI
|
49 |
M. R. Asaar, M. Salmasizadeh andW. Susilo, "A short identity-based proxy ring signature scheme from RSA," Computer Standards & Interfaces, vol. 38, pp. 144-151, 2015.
DOI
|
50 |
M. H. Au and W. Susilo, "Two-party (blind) ring signatures and their applications," in Proc. of ISPEC, pp. 403-417, May 5-8, 2014.
|
51 |
M. W. Zhang, B. Yang, S. L. Zhu and W. Z. Zhang, "Efficient secret authenticatable anonymous signcryption scheme with identity privacy," in Proc. of ISI 2008, pp.126-137, Jun. 17, 2008.
|
52 |
F. G. Li, S. Masaaki and T. Tsuyoshi, "Analysis and improvement of authenticatable ring signcryption scheme," Journal of Shanghai Jiaotong University (Science), vol. 13, no. 6, pp. 679-683, 2008.
DOI
|