[1]Diffie W, Hellman M. New directions in cryptography[J]. IEEE Trans on Information Theory, 1976, 22(6): 644654[2]Rives R, Shamir A, Adleman L. A method of obtaining digital signatures and public key cryptosystems[J]. Communications of the ACM, 1978, 21: 120126[3]Koblitz N. Elliptic curve cryptosystem[J]. Mathematics of Computation, 1987, 48(177): 203209[4]Miller V. Use of elliptic curves in cryptography[G] LNCS 85. Berlin: Springer, 1985: 417426[5]Kohnfelder L. Towards a practical publickey cryptosystem: Bachelors thesis[D]. Cambridge, MA: Department of Computer Science, Massachusetts, Institute of Technology, 1978[6]Shamir A. Identitybased cryptosystem and signature schemes [G] LNCS 196: Proc of CRYPTO84 on Advances in Cryptology, Santa Barbara, California, United States. Berlin: Springer, 1985: 4753[7]Boneh D, Franklin M. Identity based encryption from weil pairing[G] LNCS 2139: Proc of Crypto 2001. Berlin: Springer, 2001: 213229[8]Paterson K G. IDbased signatures from pairings on elliptic curves[J]. Electronics Letters, 2003, 38(18): 10251026[9]Cha J, Cheon J. An identitybased signature from gap DiffieHellman groups[G] LNCS 2567: Proc of PKC03. Berlin: Springer, 2002: 1830[10]Barreto P S L M, Libert B, Mc Cullagh N, et al. Efficient and provably secure identitybased signatures and signcryption from bilinear maps[G] LNCS 3788: Proc of ASIACRYPT. Berlin: Springer, 2005: 515532[11]陈华平, 范修斌, 吕述望. CFL专利: 中国[P]. 20160217[12]姚文建. 自组织理论下的国家开放大学办学体系建设探索[OL]. 国家开放大学时讯网, [20160410]. http:ouchn.edu.cn, 2013.10.21[13]胡向东. 应用密码学[M]. 北京: 清华大学, 2014[14]国家密码管理局. SM2椭圆曲线公钥密码算法[S]. 北京: 国家密码管理局, 2010[15]Boyen X. Multipurpose identitybased signcryption, a swiss army knife for identitybased cryptography[G] LNCS 2729. Berlin: Springer, 2003: 383399