[1]Anh L, Athina M, Alexandros G. Auditing for distributed storage systems[J]. IEEEACM Trans on Networking, 2016, 24(4): 21822195[2]Wu Bin, Wang Caifen, Yao Hailong. A certificateless linearly homomorphic signature scheme for network coding and its application in the IoT[J]. PeertoPeer Networking and Applications, 2021, 14(2): 852872[3]Li Yumei, Zhang Futai, Sun Yinxia. Lightweight certificateless linearly homomorphic network coding signature scheme forelectronic health system[J]. IET Information Security, 2020, 15(4): 131146[4]Li Yumei, Zhang Futai, Liu Xin.Secure data delivery with identitybased linearly homomorphic network coding signature Scheme in IoT[J]. IEEE Trans on Services Computing, 2022, 15(4): 22022212[5]俞惠芳, 杨波. 可证安全的无证书混合签密[J]. 计算机学报, 2015, 38(4): 804813[6]Aravind S, Praveen I, Sethumadhavan M. An INDCCA2 secure certificateless hybrid signcryption[J]. Wireless Personal Communications, 2021, 119: 35893608[7]Yu Huifang, Wang Weike, Zhang Qi. Certificateless antiquantum ring signcryption for network coding[J]. KnowledgeBased Systems, 2022, 235: 19[8]Xu Jie, Wen Qiaoyan, Li Wenmin, et al. Circuit ciphertextpolicy attributebased hybrid encryption with verifiable delegation in cloud computing[J]. IEEE Trans on Parallel and Distributed Systems, 2016, 27(11): 119129[9]Nazeer M, Mallah G, Memon R. A hybrid scheme for secure wireless communications in IoT[J]. Intelligent Automation and Soft Computing, 2021, 29(2): 633648[10]温圣军, 韩春晓, 杜琳, 等. 采用无证书密码学的安全电子邮件系统设计与分析[J]. 信息安全研究, 2021, 7(11): 10971102
|