“…Wang et al formally define the security of certificateless threshold signatures, and propose a concrete implementation based on the bilinear pairing [18]. 0020 Recently, signcryption schemes with more special purposes, such as multisigncryption [22], multireceiver signcryption [7,21], authenticable ring signcryption [23], secure multicast requirement signcryption [8], threshold signcryption [5], threshold unsigncryption [11,20] etc., are proposed.…”