1 |
Zhou, Y., and Yang, B., "Leakage-resilient CCA2-secure certificateless public-key encryption scheme without bilinear pairing," Information Processing Letters, vol.130, pp.16-24, 2018.
DOI
|
2 |
SK Hafizul, I., Muhammad, K., and Ali M, Al., "Anonymous and provably secure certificateless multi receiver encryption without bilinear pairing," Security and Communication Networks, vol.8, pp.2214-2231, 2015.
DOI
|
3 |
He, D., Wang, H., Wang, L., Shen, J., and Yang, X., "Efficient certificateless anonymous multi-receiver encryption scheme for mobile devices," Soft Computing, vol.21, no.22, pp.6801-6810, 2017.
DOI
|
4 |
Gao, R., Zeng, J., and Deng L., "Efficient certificateless anonymous multi-Receiver encryption scheme without bilinear parings," Mathematical Problems in Engineering, Article ID 1486437, 13 pages, 2018.
|
5 |
Huang, Q., and Wong, D.S., "Generic certificateless encryption in the standard model," in Proc. of International Workshop on Security, LNCS, vol.4752, pp.278-291, 2007.
|
6 |
Dent, A.W., Libert, B., and Paterson, K.G., "Certificateless encryption schemes strongly secure in the standard model," in Proc. of International Workshop on Public Key Cryptography, LNCS, vol.4939, pp.344-359, 2008.
|
7 |
Hwang, Y.H., Liu, J.K., and Chow, S.S, "Certificateless public key encryption secure against malicious KGC attacks in the standard model," Journal of Universal Computer Science, vol.14, no.3, pp.463-480, 2008.
|
8 |
Zhang, G., and Wang, X, "Certificateless encryption scheme secure in standard model," Tsinghua Science & Technology, vol.14, no.4, pp.452-459, 2009.
DOI
|
9 |
Shen, L., Zhang, F., Sun, Y., and Li, S., "Cryptanalysis of a certificateless encryption scheme in the standard model," in Proc. of International Conference on Intelligent Networking and Collaborative Systems, pp.329-333, 2012.
|
10 |
Shamir, A., "Identity-based cryptosystem and signature scheme," Advances in Cryptology-Crypto, LNCS, vol.196, pp. 47-53, 1984.
|
11 |
Al-Riyami, S.S., and Paterson, K.G., "Certificateless public key cryptography," Advances in Cryptology-Asiacrypt, LNCS, vol.2894, pp.452-473, 2003.
|
12 |
Libert, B., and Quisquater, J., "On constructing certificateless cryptosystems from identity based encryption," in Proc. of International Workshop on Public Key Cryptography, LNCS, vol.3958, pp.474-490, 2006.
|
13 |
Yan, X., Gong, P., Bai, Z., Wang, J., and Li, P., "New certificateless public key encryption scheme without pairing," IET Information Security, vol.7, iss.4, pp.271-276, 2013.
DOI
|
14 |
Sun, Y., and Li, H., "short-ciphertext and BDH-based CCA2 secure certificateless encryption," Science China: Information Science, vol.53, pp.2005-2015, 2010.
DOI
|
15 |
Baek, J., Safavi-Naini, R., and Susilo, W., "Certificateless public key encryption without pairing," in Proc. of International Conference on Information Security, LNCS, vol.3650, pp.134-148, 2005.
|
16 |
Sun, Y., Zhang, F., and Baek, J., "Strongly secure certificateless public key encryption without pairing," in Proc. of International Conference on Cryptology and Network Security, LNCS, vol.4856, pp.194-208, 2007.
|
17 |
Guo, R., Wen, Q., Shi, H., Jin, Z., and Zhang, H, "An efficient and provably secure certificateless public key encryption scheme for telecare medicine information systems," Journal of Medical Systems, vol.37, no.5, pp.9965, 2013.
DOI
|
18 |
Deng, L., Zeng, J., Wang, X, "An improved certificateless encryption scheme for telecare medicine information systems," Journal of Internet Technology, vol.18, no.2, pp.223-227, 2017.
|
19 |
He, D., Zeadally, S., Kumar, N., and Wu, W., "Efficient and anonymous mobile user authentication protocol using self-certified public key cryptography for multi-server architectures," IEEE transactions on information forensics and security, vol.11, no.9, pp.2052-2064, 2016.
DOI
|
20 |
Reza, S., Ron S., and Josef, Pieprzyk., "Lattice-based certificateless public-key encryption in the standard model," International Journal of Information Security, vol.13, pp.315-333, 2014.
DOI
|
21 |
Cheng, L., Wen, Q., Jin, Z., and Zhang, H., "Cryptanalysis and improvement of a certificateless encryption scheme in the standard model," Frontiers of Computer Science, vol.8, no.1, pp.163-173, 2014.
DOI
|