共 50 条
- [21] Attribute-based key-insulated signcryption with bidirectional anonymity Tongxin Xuebao/Journal on Communications, 2013, 34 (11): : 42 - 50
- [23] Identity-based proxy signcryption schemes INFORMATION SCIENCE AND MANAGEMENT ENGINEERING, VOLS 1-3, 2014, 46 : 1237 - 1242
- [24] An ID-based hybrid broadcast signcryption scheme with user anonymity Lin, Z.-Q., 2013, Sichuan University (45):
- [25] Schemes for encryption with anonymity and ring signature IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2006, E89A (01): : 66 - 73
- [27] Schemes for encryption with anonymity and ring signature IEICE Trans Fund Electron Commun Comput Sci, 2006, 1 (66-73):
- [29] Cryptanalysis of two identity-based signcryption schemes 2011 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), VOLS 1-4, 2012, : 694 - 698
- [30] How to construct efficient signcryption schemes on elliptic curves Inf Process Lett, 5 (227-233):