[1] Yuliang Zheng. Digital signcryption or how to achieve cost(signature + encryption) ¡ cost(signature) + cost(encryption). In Advances in Cryptology - CRYPTO ’97, pages 165–179. Springer, Berlin, Heidelberg, 1997.
[2] Joonsang Baek, Jan Newmarch, Reihaneh SafaviNaini, and Willy Susilo. A survey of identitybased cryptography. In In Proc. of the 10th Annual Conference for Australian Unix User Group, pages 95–102, 2004.
[3] Adi Shamir. Identity-based cryptosystems and signature schemes. In Advances in Cryptology: Proceedings of CRYPTO 84, pages 47–53. Springer, Berlin, Heidelberg, 1985.
[4] Chandana Gamage, Yuliang Zheng, and Jussipekka Leiwo. An efficient scheme for secure mesasage transmission using proxy-signcryption. In In Proc. 22nd Australasian Computer Science Conference (ACSC), pages 420–431, Auckland, New Zealand, 1999.
[5] Fagen Li, Yong Yu, Xudong Luo, and Feng Huang. A survey of identity-based signcryption. IETE Technical Review, 28(3):265–272, 2011.
[6] John Malone-Lee. Identity-based signcryption. Cryptology ePrint Archive, Report 2002/098, 2002.
[7] Padmalaya Nayak, P. Vasudeva Reddy, and G Swapna. Security issues in iot applications using certificateless aggregate signcryption schemes: An overview. Internet of Things, 21:100641, 2023.
[8] Jianhong Zhang, Yixian Yang, and Xinxin Niu. A novel identity-based multi-signcryption scheme. Computer communications, 32(1):14–18, 2009.
[9] S. S. D Selvi, G. P. Sarathy, and S. Sarath Kumar. Breaking and fixing of an identity-based multi-signcryption scheme. In Provable Security: Second International Conference, ProvSec 2008, Guiyang, China, October 15-17, 2008. Proceedings, pages 61–75. Springer, Berlin, Heidelberg, 2009.
[10] G. Swapna and P. Vasudeva Reddy. Efficient identity based multi-signcryption scheme with public verifiability. Journal of Discrete Mathematical Sciences and Cryptography, 17(2):181– 190, 2014.
[11] Yu Zhou, Zeng Li, Feng Hu, and Fagen Li. Identity-based combined public key schemes for signature, encryption, and signcryption. In P Chandra, D Giri, F Li, S Kar, and D Jana, editors, Information Technology and Applied Mathematics, Advances in Intelligent Systems and Computing, volume 699, pages 1–10. Springer, Singapore, 2019.
[12] SSD Selvi, SS Vivek, J Shriram, S Kalaivani, and CP Rangan. Identity based aggregate signcryption schemes. In B Roy and N Sendrier, editors, Progress in Cryptology – INDOCRYPT 2009, LNCS, volume 5922, pages 378–397. Springer, Berlin, Heidelberg, 2009.
[13] Y Sun, Cong Xu, Fagen Li, and Yong Yu. Identity based multi-proxy multi-signcryption scheme for electronic commerce. In Proc. of the 2009 Fifth International Conference on Information Assurance and Security, pages 281–284, Xi’an, China, 2009.
[14] Shruti Khullar, V Richhariya, and Vandana Richhariya. An efficient identity based multi-receiver signcryption scheme using ecc. International Journal of Advancements in Research & Technology, 2(4):189–194, Apr 2013.
[15] Z H Qi, H C Yang, and H Huang. An efficient identity-based multi-signcryption scheme. In Proc. of the International Conference on Computer Information Systems and Industrial Applications, pages 308–310. Atlantis Press, 2015.
[16] Sunil Tanwar and Ashwani Kumar. Extended identity based multi-signcryption scheme with public verifiability. Journal of Information and Optimization Sciences, 39(2):503–517, 2018.
[17] Yu Zhao, Yan Wang, Yixi Liang, Haiyang Yu, and Yang Ren. Identity-based broadcast signcryption scheme for vehicular platoon communication. IEEE Transactions on Industrial Informatics, 19(6):7814–7824, Jun 2023.
[18] T Singh, R Ali, and Varsha Tyagi. An efficient identity based multi-proxy multi-signcryption scheme for electronic commerce using bilinear pairing. Procedia Computer Science, 259:1592– 1601, 2025.
[19] Samad S Al-Riyami and Kenneth G Paterson. Certificateless public key cryptography. In Proc. Adv. Cryptol. (ASIACRYPT), volume 2894, pages 452–473, 2003.
[20] Ya Ding. Certificateless multi-signcryption scheme without pairing. Applied Mechanics and Materials, 599-601:1435–1438, 2014.
[21] Xiangdong Wu, Min Zhang, and Shengjie Zhu. Certificateless multi-signcryption scheme in standard model. International Journal of Grid and Utility Computing, 9(2):120–127, 2018.
[22] G Swapna, G Naga Malleswari, Gowri Thumbur, and T Kusuma. Efficient certificateless multisigncryption scheme using elliptic curves. Journal of Computational Analysis and Applications (JoCAAA), 33(08):2207–2216, 2024.
[23] W Long, Li Deng, Junjie Zeng, Yang Gao, and Tingyi Lu. An efficient certificateless anonymous signcryption scheme for wban. Sensors, 24(15):4899, 2024.
[24] Gang Xu, X Yin, and Xiang Li. Lightweight and secure multi-message multi-receiver certificateless signcryption scheme for the internet of vehicles. 2024.
[25] Neal Koblitz, Alfred J Koblitz, and Alfred J Menezes. Elliptic curve cryptography: The serpentine course of a paradigm shift. Journal of Number Theory, 131(5):781–814, 2011.
[26] G. Swapna, K.A. Ajmath, and Gowri Thumbur. An efficient pairing-free certificateless signcryption scheme with public verifiability. Journal of Mathematical and Computer Science, 11:24–43, 2021.
[27] Kun Ren, Wenjing Zhang, Feng Zhang, Ting He, Chan Kim, and Kiseok Lee. On broadcast authentication in wireless sensor networks. IEEE Transactions on Wireless Communications, 6(11):4136–4144, 2007.
[28] Xi Cao and Zhen-Guo Cao. A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges. Information Sciences, 180(15):2895–2903, 2010.
[29] Song-Yong Tan, Meng-Chow Lim, and MingTheng Chia. Java implementation for pairingbased cryptosystems. In Computational Science and Its Applications – ICCSA 2010: 10th International Conference, Fukuoka, Japan, March 2326, 2010. Proceedings, Part IV, volume 6016 of Lecture Notes in Computer Science, pages 188– 198. Springer, Berlin, Heidelberg, 2010.