共 50 条
- [22] Security of an identity-based cryptosystem and the related reductions ADVANCES IN CRYPTOLOGY - EUROCRYPT '98, 1998, 1403 : 546 - 560
- [23] AN IDENTITY-BASED CRYPTOSYSTEM FOR ENCRYPTING LONG MESSAGES INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2011, 7 (06): : 3295 - 3301
- [24] Broadcast encryption using identity-based cryptosystem CHINESE JOURNAL OF ELECTRONICS, 2007, 16 (04): : 716 - 720
- [25] Anonymous Identity-Based Key Scheme in Application of Privacy Protection PROCEEDINGS OF THE 2017 2ND INTERNATIONAL CONFERENCE ON EDUCATION, SPORTS, ARTS AND MANAGEMENT ENGINEERING (ICESAME 2017), 2017, 123 : 1529 - 1535
- [26] An efficient identity-based secret key management scheme for MANETs Journal of China Universities of Posts and Telecommunications, 2012, 19 (SUPPL. 1): : 127 - 136
- [27] Identity-Based Chameleon Hash Scheme without Key Exposure INFORMATION SECURITY AND PRIVACY, 2010, 6168 : 200 - +
- [28] Identity-based non-interactive key sharing equivalent to RSA public-key cryptosystem 1998 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY - PROCEEDINGS, 1998, : 384 - 384
- [29] Practical Hidden Identity-based Signature Scheme from Bilinear Pairings PROCEEDINGS OF 2010 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (ICCSIT 2010), VOL 6, 2010, : 97 - 102
- [30] Identity-Based Key Management Scheme for Smart Grid over Lattice KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2023, 17 (01): : 74 - 96