Page 300 - 《软件学报》2021年第11期
P. 300

3626                                Journal of Software  软件学报 Vol.32, No.11, November 2021

                 [7]    Wu L. An ID-based multi-receiver signcryption scheme in MANET. Journal of Theoretical and Applied Information Technology,
                     2012,46(1):120−124.
                 [8]    Peng  C, Chen  J, Obaidat  MS,  Pandi V, He DB. Efficient and  provably secure multi-receiver  signcryption  scheme  for multicast
                     communication in edge computing. IEEE Internet of Things Journal, 2020,7(7):6056−6068.
                 [9]    Pang LJ, Cui JJ, Li HX, Pei QQ, Jiang ZT, Wang YM. A new multi-receiver ID-based anonymous signcryption. Chinese Journal of
                     Computers, 2011,34(11):2104−2113 (in Chinese with English abstract).
                [10]     Pang L, Wei M, Li  H. Efficient and anonymous certificateless multi-message and multi-receiver  signcryption scheme  based  on
                     ECC. IEEE Access, 2019,7(1):24511−24526.
                [11]     Li HX, Chen XB, Ju LF, Pang LJ, Wang YM. Improved multi-receiver signcryption scheme. Journal of Computer Research and
                     Development, 2013,50(7):1418−1425 (in Chinese with English abstract).
                [12]     Chen TS, Hsiao TC, Chen TL. An efficient threshold group signature scheme. In: Proc. of the IEEE Region 10 Conf. 2004. 13−16.
                [13]     Zhang  Y, Xu  CX, Ni JB,  Li  HW, Shen XM.  Blockchain-assisted public-key  encryption  with keyword search  against keyword
                     guessing attacks for cloud storage. IEEE Trans. on Cloud Computing, 2019. [doi:10.1109/TCC.2019.2923222]
                [14]     Xie  D,  Li JJ, Shen ZH.  A new threshold signature scheme based on  elliptic  curve  cryptosystem. Journal of  Hangzhou  Normal
                     University, 2013,12(1):57−60 (in Chinese with English abstract).
                [15]     Asmuth C, Bloom J. A modular approach to key safeguarding. IEEE Trans. on Information Theory, 1983,29(2):208−210.
                [16]     Cheng Y, Liu HP. The Asmuth-bloom verifiable threshold sharing scheme. Natural Sciences Journal of Harbin Normal University,
                     2011,27(3):35−38 (in Chinese with English abstract).
                [17]     Dang  JL, Yu HF. Group  signature scheme using Chinese  remainder  theorem. Computer Engineering,  2015,41(2):113−116 (in
                     Chinese with English abstract).
                [18]     Liu HW, Xie WX, Yu JP, Zhang P. Efficiency identity-based threshold group signature scheme. Journal on Communications, 2009,
                     30(5):122−127 (in Chinese with English abstract).
                [19]     Yan J, Y XR, Zhang WJ. Research on group signature with threshold value based on elliptic curve. Journal of Southeast University
                     (Natural Science Edition), 2008,38(1):43−46 (in Chinese with English abstract).
                [20]     Gennaro  R, Jarecki S, Krawczyk H, Tai  R.  Robust  threshold  DSS signatures. In: Proc. of the  Advances in  Cryptology. 1996.
                     354−371.
                [21]     Gennaro R, Jarecki S, Krawczyk H, Tai R. Secure distributed key generation for discrete-log based cryptosystems. In: Proc. of the
                     Int’l Conf. on Theory and Application of Cryptographic Techniques. 1999. 295−310.
                [22]     Steven G, Rosario G, Harry K, Bonneau J, Joshua A, Edward W, Arvind N. Securing Bitcoin Wallets via a New DSA/ECDSA
                     Threshold Signature Scheme. 2015. http://stevengoldfeder.com/papers/threshold_sigs.pdf
                [23]     Zhou  YW, Yang Bo, Zhang  WZ. Multi-receiver and multi-message  of certificateless  signcryption  scheme. Chinese  Journal of
                     Computers, 2017,40(7):1714−1724 (in Chinese with English abstract).
                [24]     Miao SQ, Zhang FT, Zhang L. Cryptanalysis of a certificateless multi-receiver signcryption scheme. In: Proc. of the Int’l Conf. on
                     Multimedia Information Networking & Security. 2010. 593−597.
                [25]     Zhou YW, Yang Bo, Wang QL. Anonymous hybrid signcryption scheme with multi-receiver (multi-message) based on identity.
                     Ruan Jian Xue Bao/Journal of Software, 2018,29(2):442−455 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/
                     5250.htm [doi: 10.13328/j.cnki.jos.005250]
                [26]     Jing Q, Jun B, Chuan SX, Hou SM. Secure and efficient multi-message and multi-receiver ID-based signcryption for rekeying in ad
                     hoc networks. Journal of Chongqing University, 2013,12(2):91−96.
                [27]     Pang LJ, Man K, Wei MM, Li HX. Anonymous certificateless multi-receiver signcryption scheme without secure channel. IEEE
                     Access, 2019,7(1):84091−84106.
                [28]     Gen LF, Xiong H, Yun NX. A new multi-receiver ID-based signcryption scheme for group communications. In: Proc. of the Int’l
                     Conf. on Communications. 2009. 296−300.
                [29]     Bo Z, Liang XQ. An ID-based anonymous signcryption scheme for multiple receivers secure in the standard model. Int’l Journal of
                     Advanced Science Technology, 2010,6059(20):15−27.
                [30]     Corp. C. SEC 2: Recommended elliptic curve domain parameters. Certicom Corporation, 2010. 1−33.
   295   296   297   298   299   300   301   302   303   304   305