Citation: | PENG Changgen, WANG Weiru, TIAN Youliang, et al., “An Attribute-Based Signcryption Scheme and Its Application in Information Hiding,” Chinese Journal of Electronics, vol. 25, no. 4, pp. 632-640, 2016, doi: 10.1049/cje.2016.07.007 |
Y. Zheng, "Digital signcryption or how to achieve cost(signature & encryption)
|
X. Boyen, "Multipurpose identity-based signcryption", Proc. of Annual International Cryptology Conference, Santa Barbara, California, USA, pp.383-399, 2003.
|
L. Chen and J. Malone-Lee, "Improved identity-based signcryption", Proc. of International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, pp.362-379, 2005.
|
Y.X. Sun and H. Li, "ID-based signcryption KEM to multiple recipients", Chinese Journal of Electronics, Vol.20, No.2, pp.317-322, 2011.
|
X.Y. Huang, F.T. Zhang and W. Wu, "An identity-based ring signcryption scheme", Acta Electronica Sinica, Vol.34, No.2, pp.263-266, 2006. (in Chinese)
|
C.G. Peng, X. Li and W.J. Luo, "A generalized group-oriented threshold signcryption schemes", Acta Electronica Sinica, Vol.35, No.1, pp.64-67, 2007. (in Chinese)
|
V. Goyal, O. Pandey, A. Sahai, et al., "Attribute-based encryption for fine-grained access control of encrypted data", Proc. of ACM Conference on Computer and Communications Security, New York, USA, pp.89-98, 2006.
|
J. Bethencourt, A. Sahai and B. Waters, "Ciphertext-policy attribute-based encryption", Proc. of IEEE Symposium on Security and Privacy, Berkeley, California, pp.321-334, 2007.
|
M. Gagne, S. Narayan and R. Safavi-Naini, "Threshold attribute-based signcryption", Proc. of 7th International Conference of Security and Cryptography for Networks, Amalfi, Italy, pp.154-171, 2010.
|
C.J. Wang and J.S. Huang, "Attribute-based signcryption with ciphertext-policy and claim-predicate mechanism", Proc. of International Conference on Computational Intelligence and Security (CIS), Hainan, China, pp.905-909, 2011.
|
K. Emura, A. Miyaji and M.S. Rahman, "Dynamic attribute-based signcryption without random oracles", International Journal of Applied Cryptography, Vol.2, No.3, pp.199-211, 2012.
|
J. Liu, J.D. Wang and Y. Zhuang, "Attribute-based signcryption scheme on vector space", Acta Electronica Sinica, Vol.41, No.4, pp.776-780, 2013. (in Chinese)
|
A. Sahai and B. Waters, "Fuzzy identity-based encryption", Proc. of Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, pp.457-473, 2005.
|