[1]Zheng Y. Digital signcryption or how to achieve cost (signature & encryption)cost (signature)+cost (encryption)[C] Advances in Cryptology—CRYPTO’97. Berlin: Springer, 1997: 165179[2]Overill R E. Review: Advances in elliptic curve cryptography[J]. Journal of Logic and Computation, 2005, 15(5): 815815[3]中华人民共和国国家质量监督检验检疫总局, 中国国家标准化管理委员会. GBT 32918—2016 信息安全技术 SM2椭圆曲线公钥密码算法[S]. 北京: 中国标准出版社, 2016[4]国家市场监督管理总局, 国家标准化管理委员会. GBT 38635—2020 信息安全技术 SM9标识密码算法[S]. 北京: 中国标准出版社, 2020[5]赖建昌, 黄欣沂, 何德彪,等. 基于商密SM9的高效标识签密[J]. 密码学报, 2021, 8(2): 314329[6]Baek J, Steinfeld R, Zheng Y. Formal proofs for the security of signcryption[J]. Journal of Cryptology, 2007, 20(2): 203235[7]Boneh D, Franklin M. Identitybased encryption from theweil pairing[J]. SIAM Journal on Computing, 2003, 32(3): 586615[8]Ohta K, Okamoto T. On concrete security treatment of signatures derived from identification[C] Advances in Cryptology—CRYPTO’98. Berlin: Springer, 1998: 354369