S. S. Al-riyami and K. G. Paterson, Certificateless Public Key Cryptography, Advances in Cryptology- ASIACRYPT 2003, pp.452-473, 2003.
DOI : 10.1007/978-3-540-40061-5_29

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.6.8328

J. Baek, R. Steinfeld, and Y. Zheng, Formal Proofs for the Security of Signcryption, Journal of Cryptology, vol.20, issue.2, pp.203-235, 2007.
DOI : 10.1007/s00145-007-0211-0

A. Bagherzandi and S. Jarecki, Identity-Based Aggregate and Multi-Signature Schemes Based on RSA, Public Key Cryptography?PKC 2010, pp.480-498, 2010.
DOI : 10.1007/978-3-642-13013-7_28

M. Bellare and P. Rogaway, Random oracles are practical, Proceedings of the 1st ACM conference on Computer and communications security , CCS '93, pp.62-73, 1993.
DOI : 10.1145/168588.168596

A. Boldyreva, C. Gentry, A. O. Neill, and D. H. Yum, Ordered multisignatures and identity-based sequential aggregate signatures, with applications to secure routing, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, pp.276-285, 2007.
DOI : 10.1145/1315245.1315280

D. Boneh, B. Lynn, and H. Shacham, Short signatures from the weil pairing, Advances in Cryptology- ASIACRYPT, pp.514-532, 2001.
DOI : 10.1007/s00145-004-0314-9

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.107.1494

D. Boneh, C. Gentry, B. Lynn, and H. Shacham, Aggregate and Verifiably Encrypted Signatures from Bilinear Maps, Advances in cryptology-EUROCRYPT, pp.416-432, 2003.
DOI : 10.1007/3-540-39200-9_26

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.12.459

K. Y. Choi, J. H. Park, J. Y. Hwang, and D. H. Lee, Efficient Certificateless Signature Schemes, Applied Cryptography and Network Security, pp.443-458, 2007.
DOI : 10.1007/978-3-540-72738-5_29

H. Du and Q. Wen, Efficient and provably-secure certificateless short signature scheme from bilinear pairings, Computer Standards & Interfaces, vol.31, issue.2, pp.390-394, 2009.
DOI : 10.1016/j.csi.2008.05.013

C. Gamage, B. Gras, B. Crispo, and A. S. Tanenbaum, An Identity-based Ring Signature Scheme with Enhanced Privacy, 2006 Securecomm and Workshops, pp.1-5, 2006.
DOI : 10.1109/SECCOMW.2006.359554

Z. Gong, Y. Long, X. Hong, and K. Chen, Two Certificateless Aggregate Signatures From Bilinear Maps, Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007), pp.188-193, 2007.
DOI : 10.1109/SNPD.2007.132

D. He, J. Chen, and J. Hu, A pairing-free certificateless authenticated key agreement protocol, International Journal of Communication Systems, vol.58, issue.7, pp.221-230, 2012.
DOI : 10.1002/dac.1265

B. C. Hu, D. S. Wong, Z. Zhang, and X. Deng, Key Replacement Attack Against a Generic Construction of Certificateless Signature, Information Security and Privacy, pp.235-246, 2006.
DOI : 10.1007/11780656_20

B. C. Hu, D. S. Wong, Z. Zhang, and X. Deng, Certificateless signature: a new security model and an improved generic construction. Designs, Codes and Cryptography, pp.109-126, 2007.

X. Huang, W. Susilo, Y. Mu, and F. Zhang, On the Security of Certificateless Signature Schemes from Asiacrypt 2003, Cryptology and Network Security, pp.13-25, 2005.
DOI : 10.1007/11599371_2

X. Huang, Y. Mu, W. Susilo, D. S. Wong, and W. Wu, Certificateless Signature Revisited, Information Security and Privacy, pp.308-322, 2007.
DOI : 10.1007/978-3-540-73458-1_23

P. Kamat, A. Baliga, and W. Trappe, An identity-based security framework For VANETs, Proceedings of the 3rd international workshop on Vehicular ad hoc networks , VANET '06, pp.94-95, 2006.
DOI : 10.1145/1161064.1161083

P. Kamat, A. Baliga, and W. Trappe, Secure, pseudonymous, and auditable communication in vehicular ad hoc networks, pp.233-244, 2008.

X. Lin, X. Sun, P. Ho, and X. Shen, Gsis: a secure and privacy-preserving protocol for vehicular communications. Vehicular Technology, IEEE Transactions on, vol.56, issue.6, pp.3442-3456, 2007.

J. K. Liu, M. H. Au, and W. Susilo, Self-generated-certificate public key cryptography and certificateless signature/encryption scheme in the standard model, Proceedings of the 2nd ACM symposium on Information, computer and communications security, pp.273-283, 2007.

R. Lu, X. Lin, H. Zhu, P. Ho, and X. Shen, ECPP: Efficient Conditional Privacy Preservation Protocol for Secure Vehicular Communications, IEEE INFOCOM 2008, The 27th Conference on Computer Communications, 2008.
DOI : 10.1109/INFOCOM.2008.179

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.564.4866

A. Lysyanskaya, S. Micali, L. Reyzin, and H. Shacham, Sequential Aggregate Signatures from Trapdoor Permutations, Advances in Cryptology-Eurocrypt, pp.74-90, 2004.
DOI : 10.1007/978-3-540-24676-3_5

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.110.4025

S. Miao, F. Zhang, S. Li, and Y. Mu, On security of a certificateless signcryption scheme, Information Sciences, vol.232, pp.475-481, 2013.
DOI : 10.1016/j.ins.2011.11.045

A. Shamir, Identity-Based Cryptosystems and Signature Schemes, Advances in cryptology, pp.47-53, 1985.
DOI : 10.1007/3-540-39568-7_5

A. Studer, E. Shi, F. Bai, and A. Perrig, TACKing Together Efficient Authentication, Revocation, and Privacy in VANETs, 2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, pp.1-9, 2009.
DOI : 10.1109/SAHCN.2009.5168976

J. Sun, C. Zhang, and Y. Fang, An ID-based Framework Achieving Privacy and Non-Repudiation in Vehicular Ad Hoc Networks, MILCOM 2007, IEEE Military Communications Conference, pp.1-7, 2007.
DOI : 10.1109/MILCOM.2007.4454834

H. Xiong, F. Li, and Z. Qin, Certificateless threshold signature secure in the standard model, Information Sciences, vol.237, pp.73-81, 2013.
DOI : 10.1016/j.ins.2010.06.010

D. H. Yum and P. J. Lee, Generic Construction of Certificateless Signature, Information Security and Privacy, pp.200-211, 2004.
DOI : 10.1007/978-3-540-27800-9_18

L. Zhang and F. Zhang, A new certificateless aggregate signature scheme, Computer Communications, vol.32, issue.6, pp.1079-1085, 2009.
DOI : 10.1016/j.comcom.2008.12.042

L. Zhang, B. Qin, Q. Wu, and F. Zhang, Efficient many-to-one authentication with certificateless aggregate signatures, Computer Networks, vol.54, issue.14, pp.2482-2491, 2010.
DOI : 10.1016/j.comnet.2010.04.008