共 50 条
- [21] An identity-based threshold signcryption scheme with semantic security COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 173 - 179
- [24] Efficient identity based signature/signcryption scheme in the standard model PROCEEDINGS OF THE FIRST INTERNATIONAL SYMPOSIUM ON DATA, PRIVACY, AND E-COMMERCE, 2007, : 133 - +
- [25] Efficient Identity-Based Generalized Ring Signcryption Scheme KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2016, 10 (12): : 5553 - 5571
- [26] Secure and efficient identity-based threshold signcryption scheme Kongzhi yu Juece/Control and Decision, 2010, 25 (07): : 1031 - 1034
- [27] An Efficient Identity-based Multi-signcryption Scheme PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMPUTER INFORMATION SYSTEMS AND INDUSTRIAL APPLICATIONS (CISIA 2015), 2015, 18 : 308 - 310
- [28] An Efficient Identity-Based Signcryption Scheme for Multiple Receivers ADVANCES IN INFORMATION AND COMPUTER SECURITY, PROCEEDINGS, 2009, 5824 : 71 - +
- [29] Efficient identity-based signcryption scheme for multiple receivers AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2007, 4610 : 13 - +
- [30] Cryptanalysis of an efficient signcryption scheme with forward secrecy based on elliptic curve ICCEE 2008: PROCEEDINGS OF THE 2008 INTERNATIONAL CONFERENCE ON COMPUTER AND ELECTRICAL ENGINEERING, 2008, : 428 - 432