Identity-based threshold signature secure in the standard model

被引:0
|
作者
Xiong, Hu [1 ]
Qin, Zhiguang [1 ]
Li, Fagen [1 ]
机构
[1] School of Computer Science and Engineering, University of Electronic Science and Technology of China, No. 4, Section 2, North Jianshe Road, Chengdu, 610054, China
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:75 / 80
相关论文
共 50 条
  • [31] Identity-based partially blind signature in the standard model for electronic cash
    Li, Fagen
    Zhang, Mingwu
    Takagi, Tsuyoshi
    MATHEMATICAL AND COMPUTER MODELLING, 2013, 58 (1-2) : 196 - 203
  • [32] Identity-based Convertible Limited Verifier Signature Scheme in the Standard Model
    Shen Xiaoqin
    Ming Yang
    MEASURING TECHNOLOGY AND MECHATRONICS AUTOMATION, PTS 1 AND 2, 2011, 48-49 : 599 - +
  • [33] An efficient and provable secure identity-based identification scheme in the standard model
    Chin, Ji-Jian
    Heng, Swee-Huay
    Coi, Bok-Min
    PUBLIC KEY INFRASTRUCTURE, 2008, 5057 : 60 - +
  • [34] Identity-based signature scheme with partial message recovery in the standard model
    Liu, Zhen-Hua
    Zhang, Xiang-Song
    Tian, Xu-An
    Hu, Yu-Pu
    Beijing Gongye Daxue Xuebao/Journal of Beijing University of Technology, 2010, 36 (05): : 654 - 658
  • [35] Chosen Ciphertext Secure Identity-Based Broadcast Encryption in the Standard Model
    孙瑾
    胡予濮
    张乐友
    Journal of Shanghai Jiaotong University(Science), 2011, 16 (06) : 672 - 676
  • [36] Chosen ciphertext secure identity-based broadcast encryption in the standard model
    Sun J.
    Hu Y.-P.
    Zhang L.-Y.
    Journal of Shanghai Jiaotong University (Science), 2011, 16 (06) : 672 - 676
  • [37] Secure and Efficient Identity-Based Proxy Signature Scheme in the Standard Model Based on Computational Diffie-Hellman Problem
    Hu, Xiaoming
    Zhang, Xiaojun
    Wang, Jian
    Xu, Huajie
    Tan, Wenan
    Yang, Yinchun
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2017, 42 (02) : 639 - 649
  • [38] Forward Secure Identity-Based Signature Scheme with RSA
    Ko, Hankyung
    Jeong, Gweonho
    Kim, Jongho
    Kim, Jihye
    Oh, Hyunok
    ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, SEC 2019, 2019, 562 : 314 - 327
  • [39] Scalable revocable identity-based signature over lattices in the standard model
    Xie, Congge
    Weng, Jian
    Weng, Jiasi
    Hou, Lin
    INFORMATION SCIENCES, 2020, 518 : 29 - 38
  • [40] Identity-Based Multi-Proxy Signature Scheme in the Standard Model
    Gu, Ke
    Jia, Weijia
    Zhang, Jianming
    FUNDAMENTA INFORMATICAE, 2017, 150 (02) : 179 - 210