共 50 条
- [21] An Improved ID-based Proxy Signature Scheme with Message Recovery INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (09): : 151 - 163
- [22] An Enhanced ID-Based Anonymous Proxy Signature Scheme on Pairings 2010 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND AUTOMATION ENGINEERING (ICCAE 2010), VOL 4, 2010, : 343 - 346
- [23] PROXY BLIND SIGNATURE SCHEME FOR ID-BASED DESIGNATED VERIFIER 2011 INTERNATIONAL CONFERENCE ON ELECTRONICS, COMMUNICATIONS AND CONTROL (ICECC), 2011, : 376 - 379
- [24] An efficient ID-Based proxy signature scheme from pairings INFORMATION SECURITY AND CRYPTOLOGY, 2008, 4990 : 40 - 50
- [25] A new efficient ID-based proxy blind signature scheme ISCC2004: NINTH INTERNATIONAL SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, VOLS 1 AND 2, PROCEEDINGS, 2004, : 407 - 411
- [26] Analysis of an ID-based Proxy Signature Scheme Without Trusted PKG and a Proxy Blind Multi-signature Scheme 2014 15TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD), 2014, : 167 - 170
- [28] A NEW ID-BASED PROXY BLIND SIGNATURE SCHEME WITH MESSAGE RECOVERY 3RD INTERNATIONAL SYMPOSIUM ON INFORMATION ENGINEERING AND ELECTRONIC COMMERCE (IEEC 2011), PROCEEDINGS, 2011, : 162 - 165
- [29] Secure delegation-by-warrant ID-based proxy signcryption scheme COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 445 - 450
- [30] Improvement of an ID-based Proxy Signature Scheme Without Trusted PKG 2015 16TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD), 2015, : 171 - 174