ZHENG YULIANG. Signcryption and its application in efficient public keysolutions[C]//LNCS1396,InformationSecurityWorkshop(ISW'97).Berlin: Spring-Verlag,1997:291-312 .
[2]
SHAMIR A. How to share a secret[J]. Comm ACM,1979,22(11):612-613.
[3]
SHAMIRA. Identity-Based Cryptosystems and Signature Schemes[M].BLAKLEY G R,CH AUMD. Advances in Cryptology: CRYPTO 1984,Berlin: Spring-verlag,1997:47-53.
[4]
JOHN MALONE-LEE. Identity-based signcrypion[R]. Cryptology Eprint Archive,Report 2002/098,2002.