共 50 条
- [21] A new identity-based conference key distribution scheme 2000 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, PROCEEDINGS, 2000, : 269 - 269
- [22] A Practical Key Issuing Scheme in Identity-based Cryptosystem 2008 ISECS INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT, VOL 1, PROCEEDINGS, 2008, : 454 - 457
- [23] Identity-based key-insulated signcryption scheme Journal of Computational Information Systems, 2013, 9 (08): : 3067 - 3075
- [24] Identity-based cryptography in public key management PUBLIC KEY INFRASTRUCTURE, PROCEEDINGS, 2004, 3093 : 71 - 84
- [26] Efficient Identity-Based Key Management for Configurable Hierarchical Cloud Computing Environment 2011 IEEE 17TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS (ICPADS), 2011, : 883 - 887
- [27] A Key Management Scheme Based on Key Hypergraph and Identity-based Cryptography in Multi-domain Optical Networks 1600, Sichuan University (49): : 85 - 92
- [28] Identity-Based Inner Product Functional Encryption with Verified Secret Key Jisuanji Xuebao/Chinese Journal of Computers, 2021, 44 (01): : 209 - 221
- [30] An Efficient Identity-Based Deniable Authenticated Encryption Scheme KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2015, 9 (05): : 1904 - 1919