共 50 条
- [32] Key Generation Algorithm Design Combination of RSA and ElGamal Algorithm [J]. PROCEEDINGS OF 2016 8TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND ELECTRICAL ENGINEERING (ICITEE), 2016,
- [33] Overcome Key Escrow Problem with Attribute-Based Data Access Policy & Efficient Cloud Environment [J]. 2017 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION, CONTROL AND AUTOMATION (ICCUBEA), 2017,
- [34] Key escrow with tree-based access structure [J]. COMPUTER NETWORK SECURITY, PROCEEDINGS, 2005, 3685 : 454 - 459
- [35] New key escrow scheme based on digital certificate [J]. Hunan Daxue Xuebao/Journal of Hunan University Natural Sciences, 2001, 28 (06):
- [36] Loop-based RSA Key Generation Algorithm using String Identity [J]. 2013 13TH INTERNATIONAL CONFERENCE ON CONTROL, AUTOMATION AND SYSTEMS (ICCAS 2013), 2013, : 255 - 258
- [37] Security Analysis of an RSA Key Generation Algorithm with a Large Private Key [J]. INFORMATION SECURITY, 2011, 7001 : 95 - +
- [38] Key Escrow Protocol Based on a Tripartite Authenticated Key Agreement and Threshold Cryptography [J]. IEEE ACCESS, 2019, 7 : 149080 - 149096
- [39] Protecting against key escrow and key exposure in identity-based cryptosystem [J]. THEORY AND APPLICATIONS OF MODELS OF COMPUTATION, PROCEEDINGS, 2007, 4484 : 148 - +