共 50 条
- [41] An Efficient Identity-Based Group Key Agreement Protocol 2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 2821 - 2825
- [42] Efficient identity-based key encapsulation to multiple parties CRYPTOGRAPHY AND CODING, PROCEEDINGS, 2005, 3796 : 428 - 441
- [43] Efficient Identity-Based Generalized Ring Signcryption Scheme KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2016, 10 (12): : 5553 - 5571
- [44] Efficient identity-based and authenticated key agreement protocol Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2013, 7420 : 172 - 197
- [45] Secure and efficient identity-based threshold signcryption scheme Kongzhi yu Juece/Control and Decision, 2010, 25 (07): : 1031 - 1034
- [46] An efficient and full secure identity-based encryption scheme Shanghai Jiaotong Daxue Xuebao/Journal of Shanghai Jiaotong University, 2010, 44 (03): : 389 - 392
- [48] Anonymous Identity-Based Key Scheme in Application of Privacy Protection PROCEEDINGS OF THE 2017 2ND INTERNATIONAL CONFERENCE ON EDUCATION, SPORTS, ARTS AND MANAGEMENT ENGINEERING (ICESAME 2017), 2017, 123 : 1529 - 1535
- [49] Identity-Based Chameleon Hash Scheme without Key Exposure INFORMATION SECURITY AND PRIVACY, 2010, 6168 : 200 - +
- [50] Private Key Management in Hierarchical Identity-Based Encryption SITIS 2007: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SIGNAL IMAGE TECHNOLOGIES & INTERNET BASED SYSTEMS, 2008, : 206 - 212