Page 281 - 《软件学报》2021年第10期
P. 281

刘镇  等:安全随机数部分重用及在多接收方签密的应用                                                      3253


                [15]    Ullah I, Ul Amin N, Zareei M, et al. A lightweight and provable secured certificateless signcryption approach for crowdsourced
                     IIoT applications. Symmetry, 2019,11(11):1386.
                [16]    Pang L, Kou M, Wei M, et al. Efficient anonymous certificateless multi-receiver signcryption scheme without bilinear pairings.
                     IEEE Access, 2018,6:7812378135.
                [17]    Pang L, Wei  M, Li  H.  Efficient and anonymous certificateless multi-message and multi-receiver  signcryption scheme  based  on
                     ECC. IEEE Access, 2019,7:2451124526.
                [18]    Lu XH,  Wen QY,  Wang LC,  et  al. A lattice-based signcryption scheme  without  trapdoors.  Journl of  Electronic Information
                     Technology, 2016,38:22872293 (in Chinese with English abstract).
                [19]    Micciancio D, Regev O. Worst-case to average-case reductions based on Gaussian measures. SIAM Journal on Computing, 2007,
                     37(1):267302.
                [20]    Peikert C. A decade of lattice cryptography. Foundations and Trends® in Theoretical Computer Science, 2016,10(4):283424.
                [21]    Bai S, Galbraith  SD.  An improved  compression technique for signatures based on learning  with  errors. In: Proc. of the
                     Cryptographers’ Track at the RSA Conf. Cham: Springer-Verlag, 2014. 2847.
                [22]    Lu X, Wen Q, Jin Z, et al. A lattice-based multi-receiver signcryption scheme for point to multi-point communication. In: Proc. of
                     the 2013 Int’l Conf. on Information and Network Security (ICINS 2013). IET, 2013. 17.
                [23]    Zhang X,  Xu C, Xue  J. Efficient multi-receiver identity-based signcryption  from lattice assumption.  Int’l  Journal of Electronic
                     Security and Digital Forensics, 2018,10(1):2038.

                 附中文参考文献:
                 [18]  路秀华,温巧燕,王励成,等.无陷门格基签密方案.电子与信息学报,2016,38(9):22872293



                              刘镇(1985-),男,博士生,讲师,主要研究                      杨晓元(1959-),男,博士,教授,博士生导
                              领域为公钥密码算法,可证明安全.                             师,主要研究领域为密码学,信息安全.




                              韩益亮(1977-),男,博士,教授,博士生导                      柳曙光(1976-),男,副教授,主要研究领域
                              师,主要研究领域为密码学,隐私保护,社                          为计算机应用,信息安全.
                              交网络分析.
   276   277   278   279   280   281   282   283   284   285   286