共 50 条
- [2] Schemes for encryption with anonymity and ring signature IEICE Trans Fund Electron Commun Comput Sci, 2006, 1 (66-73):
- [3] A Closer Look at Anonymity and Robustness in Encryption Schemes ADVANCES IN CRYPTOLOGY - ASIACRYPT 2010, 2010, 6477 : 501 - 518
- [4] RANDOMIZED ENCRYPTION AND SIGNATURE SCHEMES ARAB GULF JOURNAL OF SCIENTIFIC RESEARCH, 1994, 12 (01): : 41 - 53
- [6] A Note on the Invisibility and Anonymity of Undeniable Signature Schemes INFORMATION SECURITY APPLICATIONS, WISA 2019, 2020, 11897 : 112 - 125
- [7] On the Security of a Proxy Ring Signature with Revocable Anonymity MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 205 - +
- [9] On the Security of a Proxy Ring Signature with Revocable Anonymity JOURNAL OF INTERNET TECHNOLOGY, 2015, 16 (07): : 1169 - 1175
- [10] A Suite of Non-pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity PROVABLE SECURITY, 2010, 6402 : 166 - +