|
[1] A. Shamir, “Identity-based cryptosystems and signature schemes,” in Workshop on the Theory and Application of Cryptographic Techniques, pp. 47–53, Springer, 1984.
[2] R. Sakai, K. Ohgishi, and M. Kasahara, “Cryptosystems based on pairings,” in Symposium on Cryptography and Information Security, SCIS, 2000.
[3] D. Boneh and M. Franklin, “Identity-based encryption from the weil pairing,” in Annual International Cryptology Conference, pp. 213–229, Springer, 2001.
[4] R. L. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures and public-key cryptosystems,” Communications of the ACM, vol. 21, no. 2, pp. 120–126, 1978.
[5] B. Libert and J.-J. Quisquater, “A new identity based signcryption scheme from pairings,” in Proceedings 2003 IEEE Information Theory Workshop (Cat. No. 03EX674), pp. 155–158, IEEE, 2003.
[6] S. S. Chow, S.-M. Yiu, L. C. Hui, and K. Chow, “Efficient forward and provably secure idbased signcryption scheme with public verifiability and public ciphertext authenticity,” in International Conference on Information Security and Cryptology, pp. 352–369, Springer, 2003.
[7] X. Boyen, “Multipurpose identity-based signcryption,” in Annual International Cryptology Conference, pp. 383–399, Springer, 2003.
[8] J. Baek, R. Safavi-Naini, and W. Susilo, “Efficient multi-receiver identity-based encryption and its application to broadcast encryption,” in International Workshop on Public Key Cryptography, pp. 380–397, Springer, 2005.
[9] S. S. D. Selvi, S. S. Vivek, D. Shukla, and P. R. Chandrasekaran, “Efficient and provably secure certificateless multi-receiver signcryption,” in International Conference on Provable Security, pp. 52–67, Springer, 2008.
[10] L. Pang, L. Gao, H. Li, and Y. Wang, “Anonymous multi-receiver id-based signcryption scheme,” IET Information Security, vol. 9, no. 3, pp. 194–201, 2015.
[11] P. W. Shor, “Algorithms for quantum computation: discrete logarithms and factoring,” in Proceedings 35th Annual Symposium on Foundations of Computer Science, pp. 124–134, IEEE, 1994.
[12] M. Ajtai, “Generating hard instances of lattice problems,” in Proceedings of the Twenty-Eighth Annual ACM Symposium on Theory of Computing, pp. 99–108, ACM, 1996.
[13] M. Ajtai and C. Dwork, “A public-key cryptosystem with worst-case/average-case equivalence,” in Proceedings of the Twenty-Ninth Annual ACM Symposium on Theory of Computing, pp. 284–293, 1997.
[14] O. Goldreich, S. Goldwasser, and S. Halevi, “Public-key cryptosystems from lattice reduction problems,” in Annual International Cryptology Conference, pp. 112–131, Springer, 1997.
[15] J. Hoffstein, J. Pipher, and J. H. Silverman, “NTRU: A ring-based public key cryptosystem,” in International Algorithmic Number Theory Symposium, pp. 267–288, Springer, 1998.
[16] O. Regev, “On lattices, learning with errors, random linear codes, and cryptography,” Journal of the ACM (JACM), vol. 56, no. 6, pp. 1–40, 2009.
[17] M. Ajtai, “The shortest vector problem in l2 is np-hard for randomized reductions,” in Proceedings of the Thirtieth Annual ACM Symposium on Theory of Computing, pp. 10–19, 1998.
[18] L. Ducas, A. Durmus, T. Lepoint, and V. Lyubashevsky, “Lattice signatures and bimodal gaussians,” in Annual Cryptology Conference, pp. 40–56, Springer, 2013.
[19] O. Regev, “On lattices, learning with errors, random linear codes, and cryptography,” in ACM Symposium on Theory of Computing, p. 84–93, Association for Computing Machinery, 2005.
[20] D. Micciancio and C. Peikert, “Trapdoors for lattices: Simpler, tighter, faster, smaller,” in Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 700–718, Springer, 2012.
[21] N. Genise and D. Micciancio, “Faster gaussian sampling for trapdoor lattices with arbitrary modulus,” in Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 174–203, Springer, 2018.
[22] C. Peikert, “Lattice cryptography for the internet,” in international Workshop on Post- Quantum Cryptography, pp. 197–219, Springer, 2014.
[23] L. Pang and H. Li, “nmibas: a novel multi-receiver id-based anonymous signcryption with decryption fairness,” Computing and Informatics, vol. 32, no. 3, pp. 441–460, 2013.
[24] L. Pang, M. Kou, M. Wei, and H. Li, “Efficient anonymous certificateless multi-receiver signcryption scheme without bilinear pairings,” IEEE Access, vol. 6, pp. 78123–78135, 2018.
[25] X. Zhang, C. Xu, and J. Xue, “Efficient multi-receiver identity-based signcryption from lattice assumption,” in International Journal of Electronic Security and Digital Forensics, vol. 10, pp. 20–38, Inderscience Publishers (IEL), 2018.
[26] J. Alwen and C. Peikert, “Generating shorter bases for hard random lattices,” in Theory of Computing Systems, vol. 48, pp. 535–553, Springer, 2011.
|