Page 300 - 《软件学报》2021年第11期
P. 300
3626 Journal of Software 软件学报 Vol.32, No.11, November 2021
[7] Wu L. An ID-based multi-receiver signcryption scheme in MANET. Journal of Theoretical and Applied Information Technology,
2012,46(1):120−124.
[8] Peng C, Chen J, Obaidat MS, Pandi V, He DB. Efficient and provably secure multi-receiver signcryption scheme for multicast
communication in edge computing. IEEE Internet of Things Journal, 2020,7(7):6056−6068.
[9] Pang LJ, Cui JJ, Li HX, Pei QQ, Jiang ZT, Wang YM. A new multi-receiver ID-based anonymous signcryption. Chinese Journal of
Computers, 2011,34(11):2104−2113 (in Chinese with English abstract).
[10] Pang L, Wei M, Li H. Efficient and anonymous certificateless multi-message and multi-receiver signcryption scheme based on
ECC. IEEE Access, 2019,7(1):24511−24526.
[11] Li HX, Chen XB, Ju LF, Pang LJ, Wang YM. Improved multi-receiver signcryption scheme. Journal of Computer Research and
Development, 2013,50(7):1418−1425 (in Chinese with English abstract).
[12] Chen TS, Hsiao TC, Chen TL. An efficient threshold group signature scheme. In: Proc. of the IEEE Region 10 Conf. 2004. 13−16.
[13] Zhang Y, Xu CX, Ni JB, Li HW, Shen XM. Blockchain-assisted public-key encryption with keyword search against keyword
guessing attacks for cloud storage. IEEE Trans. on Cloud Computing, 2019. [doi:10.1109/TCC.2019.2923222]
[14] Xie D, Li JJ, Shen ZH. A new threshold signature scheme based on elliptic curve cryptosystem. Journal of Hangzhou Normal
University, 2013,12(1):57−60 (in Chinese with English abstract).
[15] Asmuth C, Bloom J. A modular approach to key safeguarding. IEEE Trans. on Information Theory, 1983,29(2):208−210.
[16] Cheng Y, Liu HP. The Asmuth-bloom verifiable threshold sharing scheme. Natural Sciences Journal of Harbin Normal University,
2011,27(3):35−38 (in Chinese with English abstract).
[17] Dang JL, Yu HF. Group signature scheme using Chinese remainder theorem. Computer Engineering, 2015,41(2):113−116 (in
Chinese with English abstract).
[18] Liu HW, Xie WX, Yu JP, Zhang P. Efficiency identity-based threshold group signature scheme. Journal on Communications, 2009,
30(5):122−127 (in Chinese with English abstract).
[19] Yan J, Y XR, Zhang WJ. Research on group signature with threshold value based on elliptic curve. Journal of Southeast University
(Natural Science Edition), 2008,38(1):43−46 (in Chinese with English abstract).
[20] Gennaro R, Jarecki S, Krawczyk H, Tai R. Robust threshold DSS signatures. In: Proc. of the Advances in Cryptology. 1996.
354−371.
[21] Gennaro R, Jarecki S, Krawczyk H, Tai R. Secure distributed key generation for discrete-log based cryptosystems. In: Proc. of the
Int’l Conf. on Theory and Application of Cryptographic Techniques. 1999. 295−310.
[22] Steven G, Rosario G, Harry K, Bonneau J, Joshua A, Edward W, Arvind N. Securing Bitcoin Wallets via a New DSA/ECDSA
Threshold Signature Scheme. 2015. http://stevengoldfeder.com/papers/threshold_sigs.pdf
[23] Zhou YW, Yang Bo, Zhang WZ. Multi-receiver and multi-message of certificateless signcryption scheme. Chinese Journal of
Computers, 2017,40(7):1714−1724 (in Chinese with English abstract).
[24] Miao SQ, Zhang FT, Zhang L. Cryptanalysis of a certificateless multi-receiver signcryption scheme. In: Proc. of the Int’l Conf. on
Multimedia Information Networking & Security. 2010. 593−597.
[25] Zhou YW, Yang Bo, Wang QL. Anonymous hybrid signcryption scheme with multi-receiver (multi-message) based on identity.
Ruan Jian Xue Bao/Journal of Software, 2018,29(2):442−455 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/
5250.htm [doi: 10.13328/j.cnki.jos.005250]
[26] Jing Q, Jun B, Chuan SX, Hou SM. Secure and efficient multi-message and multi-receiver ID-based signcryption for rekeying in ad
hoc networks. Journal of Chongqing University, 2013,12(2):91−96.
[27] Pang LJ, Man K, Wei MM, Li HX. Anonymous certificateless multi-receiver signcryption scheme without secure channel. IEEE
Access, 2019,7(1):84091−84106.
[28] Gen LF, Xiong H, Yun NX. A new multi-receiver ID-based signcryption scheme for group communications. In: Proc. of the Int’l
Conf. on Communications. 2009. 296−300.
[29] Bo Z, Liang XQ. An ID-based anonymous signcryption scheme for multiple receivers secure in the standard model. Int’l Journal of
Advanced Science Technology, 2010,6059(20):15−27.
[30] Corp. C. SEC 2: Recommended elliptic curve domain parameters. Certicom Corporation, 2010. 1−33.