【正文】
or how to achieve cost ( signature amp。 encryption ) cost( signature)+cost( encryption) [C].In: CRYPTO39。97, LNCS1294 Springer Verlag, 1997,165~179.[2] and Its Applications in Efficient Public Key Solution[C].Berlin:Proceedings of Information Security Workshop (ISW’97), LNCS1397, Springer Verlag,1998,291312.[3]LibertB, Based Signcryption Schemes from Pairings[C]. IEEE Information Theory Workshop,Springer Verlag,2003,4657.[ 4 ] F Bao, R H Deng. A signcryption scheme with signaturedirectly veriable by public key[A ]. LNCS 1431, in PKC’98 [C ]. Berlin: Springer2Verlag, 1998. 55 59.[ 5 ] P Horster,M Michels, H Petersen. Authenticated encryption schemeswith low munication costs[ J ]. ElectronicsLetters. 1994, 30 (15) : 1212 1213.[ 6 ] Mun Kyu Lee, Dong Kyue Kim, Kunsoo Park. An authenticated encryption scheme with public verifiability[A ]. 5 th Japan2Korea JointWorkshop on Algorithms and Computation[C ]. Tokyo, Japan, 2000. 49 56.[7] 張串絨,,2006 , 34(1) : 177179.