Secure and efficient identity-based threshold signcryption scheme

被引:0
|
作者
Sun, Hua [1 ]
Zheng, Xue-Feng [1 ]
Yu, Yi-Ke [1 ]
Zhou, Fang [1 ]
机构
[1] School of Information Engineering, University of Science and Technology Beijing, Beijing 100083, China
来源
Kongzhi yu Juece/Control and Decision | 2010年 / 25卷 / 07期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:1031 / 1034
相关论文
共 50 条
  • [1] A provable secure identity-based threshold proxy signcryption scheme
    Hu, D. (hdf666@163.com), 2013, CESER Publications, Post Box No. 113, Roorkee, 247667, India (51):
  • [2] An efficient and provable secure identity-based ring signcryption scheme
    Zhu, ZhenChao
    Zhang, Yuqing
    Wang, Fengjiao
    COMPUTER STANDARDS & INTERFACES, 2009, 31 (06) : 1092 - 1097
  • [3] Secure Monitoring Scheme Based on Identity-based Threshold Signcryption for Wireless Sensor Networks
    Li Jing-feng
    Wei Da-wei
    Kou Hong-zhao
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 3718 - 3721
  • [4] An efficient identity-based broadcast signcryption scheme
    Luo, Ming
    Zou, Chunhua
    Xu, Jianfeng
    Journal of Software, 2012, 7 (02) : 366 - 373
  • [5] An Efficient and Provably-Secure Identity-based Signcryption Scheme for Multiple PKGs
    Jin, Zhengping
    Zuo, Huijuan
    Du, Hongzhen
    Wen, Qiaoyan
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, 2008, : 189 - 193
  • [6] An Efficient and Secure Scheme for Smart Home Communication using Identity-Based Signcryption
    Ashibani, Yosef
    Mahmoud, Qusay H.
    2017 IEEE 36TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC), 2017,
  • [8] An identity-based threshold signcryption scheme with semantic security
    Peng, CG
    Li, X
    COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 173 - 179
  • [9] Efficient and identity-based signcryption with provably-secure
    Wen Y.
    Ma J.
    Moon S.
    International Journal of Digital Content Technology and its Applications, 2010, 4 (07) : 148 - 153
  • [10] Provably Secure and Efficient Multi-Receiver Identity-Based Generalized Signcryption Scheme
    Zhou, Caixue
    2014 NINTH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIA JCIS), 2014, : 82 - 88