Citation: | ZHOU Caixue, “Certificateless Signcryption Scheme Without Random Oracles,” Chinese Journal of Electronics, vol. 27, no. 5, pp. 1002-1008, 2018, doi: 10.1049/cje.2018.06.002 |
H.F. Zhu, Y.A. Tan, X. Yu, et al., “An identity-based proxy signature on NTRU lattice”, Chinese Journal of Electronics, Vol.27, No.2, pp.297-303, 2018.
|
T. Wu and X.J. Jing, “Cryptanalysis and improvement of a certificateless signature scheme with strong unforgeability”, Acta Electronica Sinica, Vol.46, No.3, pp.602-606, 2018. (in Chinese)
|
Y.W. Zhou, B. Yang and W.Z. Zhang, “Anonymous certificateless signcryption scheme with multi-receiver”, Acta Electronica Sinica, Vol.44, No.8, pp.1784-1790, 2018. (in Chinese)
|
M. Barbosa and P. Farshim, “Certificateless signcryption”, Proc. of the 2008 ACM Symposium on Information, Computer and Communications Security, Tokyo, Japan, pp.369-372, 2008.
|
M. Bellare and P. Rogaway, “Random oracles are practical: A paradigm for designing efficient protocols”, Proc. of the 1st ACM Conference on Computer and Communications Security, Fairfax, USA, pp.62-73, 1993.
|
R. Canetti, O. Goldreich and S. Halevi, “The random oracle methodology, revisited”, Journal of the ACM, Vol.51, No.4, pp.557-594, 2004.
|
Z.H. Liu, Y.P. Hu, X.S. Zhang, et al., “Certificateless signcryption scheme in the standard model”, Information Sciences, Vol.180, No.3, pp.452-464, 2010.
|
S.S.D. Selvi, S.S. Vivek and C.P. Rangan, “Security weaknesses in two certificateless signcryption schemes”, http://eprint.iacr.org/2010/092, 2010-2-20.
|
Z.P. Jin, Q.Y. Wen and H. Zhang, “A supplement to Liu et al.’s certificateless signcryption scheme in the standard model”, http://eprint.iacr.org/2010/252, 2010-5-3.
|
J. Weng, G.X. Yao, R.H. Deng, et al., “Cryptanalysis of a certificateless signcryption scheme in the standard model”, Information Sciences, Vol.181, No.3, pp.661-667, 2011.
|
S.Q. Miao, F.T. Zhang, S.J. Li, et al., “On security of a certificateless signcryption scheme”, Information Sciences, Vol.232, pp.475-481, 2013.
|
H. Xiong, “Toward certificateless signcryption scheme without random oracle”, http://eprint.iacr.org/2014/162, 2014-3-3.
|
L. Cheng and Q.Y. Wen, “An improved certificateless signcryption in the standard model”, International Journal of Network Security, Vol.17, No.5, pp.597-606, 2015.
|
C.X. Zhou, G.Y. Gao and Z.M. Cui, “Certificateless signcryption in the standard model”, Wireless Personal Communicatons, Vol.92, No.2, pp.495-513, 2017.
|
M.H. Au, Y. Mu, J. Chen, et al., “Malicious KGC attacks in certificateless cryptography”, Proc. of the 2nd ACM Symposium on Information, Computer and Communications Security, Singapore, Singapore, pp.302-311, 2007.
|
Q. Huang and D.S. Wong, “Generic certificateless encryption in the standard model”, International Conference on Advances in Information and Computer Security, Nara, Japan, pp.278-291, 2007.
|
H. Xiong, Z.G. Qin and F.G. Li, “An improved certificateless signature scheme secure in the standard model”, Fundamenta Informaticae, Vol.88, No.1, pp.193-206, 2008.
|
K. Shim and Y.R. Lee, “Security pitfalls of the certificateless signature and multi-receiver signcryption schemes”, Fundamenta Informaticae, Vol.112, No.4, pp.365-376, 2011.
|
L. Cheng, Q.Y. Wen, Z.P. Jin, et al., “Cryptanalysis and improvement of a certificateless encryption scheme in the standard model”, Frontiers in Computer Science, Vol.8., No.1, pp.163-173, 2014.
|
Y.M. Yuan and C.H. Wang, “Certificateless signature scheme with security enhanced in the standard model”, Information Processing Letters, Vol.114, No.9, pp.492-499, 2014.
|
B. Waters, “Efficient identity-based encryption without random oracles”, Proc. of Advances in Cryptology-EUROCRYPT, Aarhus, Denmark, pp.114-127, 2005.
|
C. Gentry, “Practical identity-based encryption without random oracles”, Proc. of Advances in Cryptology-EUROCRYPT, St. Petersburg, Russia, pp.445-464, 2006.
|
H. Wang, Y. Zhang, H. Xiong, et al., “Cryptanalysis and improvements of an anonymous multi-receiver identity-based encryption scheme”, IET Information Security, Vol.6, No.1, pp.20-27, 2012.
|
Y.L. Ren and D.W. Gu, “Efficient identity based signature/signcryption scheme in the standard model”, Proc. of the First International Symposium on Data, Privacy, and ECommerce, ChengDu, China, pp.133-137, 2007.
|
“PBC library”, http://crypto.stanford.edu/pbc, 2015.
|