3Zheng Y.. Digital signcryption or how to achieve cost (signature & encryption<< cost (signature) + cost (encryption). In:Kaliski Jr B. S. ed.. Advances in Cryptology-CRYPTO' 97,Lecture Notes in Computer Science 1294. Berlin: Springer-Verlag, 1997, 165-179
4Gamage C. , Leiwo J. , Zheng Y.. Encrypted message authentication by firewalls. In: Imai H. , Zheng Y. eds.. Public Key Cryptography-PKC' 99, Lecture Notes in Computer Science 1560. Berlin: Springer-Verlag, 1999, 69-81
5Pang X. , Tan K. L. , Wang Y. , Ren J.. A secure agent-mediated payment protocol. In: Deng R. H. , Qing S. , Bao F. ,Zhou J. eds.. Information and Communications Security-ICICS 2002, Lecture Notes in Computer Science 2513. Berlin:Springer-Verlag, 2002, 422-433
6Shamir A.. Identity-based cryptosystems and signature schemes. In: Blakley G. R. , Chaum D. eds.. Advances in Cryptology-CRYPTO'84, Lecture Notes in Computer Science 196. Berlin: Springer-Verlag, 1984, 47-53
7Boneh D. , Franklin M.. Identity-based encryption from the Weil pairing. In: Kilian J. ed.. Advances in Cryptology-CRYPTO 2001, Lecture Notes in Computer Science 2139. Berlin: Springer-Verlag, 2001, 213-229
9Libert B. , Quisquater J.. A new identity based signcryption schemes from pairings. In: Proceeding of the 2003 IEEE Information Theory Workshop, Paris, France, 2003, 155-158
10Nalla D., Reddy K. C.. Signcryption scheme for identity-based cryptosystems. Cryptology ePrint Archive, Report2003/066, IACR, 2003