The following publications are possibly variants of this publication:
- Efficient Identity Based Proxy-Signcryption Schemes with Forward Security and Public VerifiabilityMeng Wang, Hui Li, Zhijing Liu. iccnmc 2005: 982-991 [doi]
- Efficient ID-Based Proxy Signature and Proxy Signcryption Form Bilinear PairingsQin Wang, Zhenfu Cao. cis 2005: 167-172 [doi]
- Identity Based Threshold Proxy Signcryption SchemeMeng Wang, Zhijing Liu. IEEEcit 2005: 695-701 [doi]
- Identity-based signcryption from latticesJianhua Yan, Licheng Wang, Mianxiong Dong, Yixian Yang, Wenbin Yao. scn, 8(18):3751-3770, 2015. [doi]