参考文献/References:
[ 1] Sham ir A. Identity-based cryptosystem s and signature
schem es [ A ] . Advances in C ryto logy-Cryp to . 84,
LNCS 196 [ C ]. Berlin: Spr inge r-Ver lag, 1984, 47
- 53.
[ 2] Cha J C, Cheon JH. An identity-based signature from
gap d iffie-he llm an g roups[ A] . Public Key Cryptog raphy-
PKC '2003 ( LNCS 2567) [ C ]. Berlin: Spr ing er-
Verlag, 2003. 18- 30.
[ 3] Boneh D, Lynn B, Shacham H. Short signatures from
the we il pa iring [ A ] . Pro c Advances in Crypto logy-
Asiacrypt 2001 [ C ]. Go ld Coast, Queensland, Austra
lia: [ s. n. ], 2001. 514- 532.
[ 4] Cha J C, Cheon J H. An Identity-based signature from
Gap D iffie-H ellm an groups [ EB /OL]. http: / / epr int.
iacr. org /2002 /0184, 2002- 02- 15.
[ 5] Pate rson K G. ID-based signatures from pa irings on e-l
liptic curves [ J ]. E lectron Le tt, 2002, 38 ( 18 ):
1 025- 1 026.
[ 6 ] H ess F. E ffic ient identity based signature schem es
based on pa irings[ A]. Advances in Crypto logy-A siacrypt'
2001, LNCS 2595[ C ]. Berlin: Spr ing er-Ve rlag,
2003. 310- 324.
[ 7] Zheng Y. D ig ita l s ignc ryption or how to ach ieve cost
( signature& encryption )《cost ( signautre ) - + -
cost( encryption) [ A ]. Advance in Crypto logy CRTPTO97(
LNCS1294) [ C]. Ge rm any: Springer-Ver lag,
1997. 165- 179.
[ 8] Zheng Y, Im ai H. E ffic ient signcryption schem es on
e lliptic curves[ J]. In fo rm Process Letters, 1998, 68
( 6): 227- 233.
[ 9] Lee JM. Signcryption w ith Non-Repudiation [ R ].
B risto :l Departm ent o f Computer Science, Un iv ers ity
o f Br isto,l 2002.
[ 10 ] M a lone-Lee J. Identity based signcryption [ EB /
OL] . http: / /eprint. iacr. o rg /2002/098, 2002 -
07- 19.
[ 11] L ibert B, Quisquate r J-J. New identity based signcryption
schem es from pa ir ing s [ EB /OL] . http: / /
eprin t. iacr. org /2003 /023, 2003- 02- 24.