5Rivest R, Shamir A, Tauman Y. How to Leak a Secret[C]//Proc. of the 7th International Conference on the Theory and Application of Cryptology and Information Security. Gold Coast, Australia: [s. n.], 2001.
6Zheng Yinliang. Digital Signcryption or How to Achieve Cost (Signature & Encryption)-Cost(Signature)+Cost(Encryption)[C]// Proc. of the 17th Annual International Cryptology Conference on Advances in Cryptology. Santa Barbara, USA: [s. n.], 1997.
7Ma Changshe. Efficient Short Signcryption Scheme with Public Verifiability[C]//Proc. of the 6th China International Conference on Information Security and Cryptology. Beijing, China: [s. n.], 2006.
8Ji Peng, Yang Muxiang. Verifiable Short Signcryption without Random Oracle[C]//Proc. of Conf. on Wireless Communications, Networking and Mobile Computing. Shanghai, China: [s. n.], 2007.
9Zhang Fangguo, Safavi-Naini R, Susilo W. An Efficient Signature Scheme from Bilinear Pairings and Its Applications[C]//Proc. of the 7th International Workshop on Practice and Theory in Public Key Cryptography. Sentosa, Singapore: [s. n.], 2004.
10Huang Xinyi, Susilo W. Mu Yi. et al. Identity-based Ring Signcryption Schemes: Cryptographic Primitives for Preserving Privacy and Authenticity in the Ubiquitous World[C]//Proc. of the 19th 1EEE International Conference on Advanced Information Networking and Applications, Taipei, China: [s. n.], 2005.