共 50 条
- [32] AN EFFICIENT AND SECURE IDENTITY-BASED STRONG DESIGNATED VERIFIER SIGNATURE SCHEME [J]. INFORMATION TECHNOLOGY AND CONTROL, 2011, 40 (04): : 323 - 329
- [33] Identity-Based Signature Scheme Secure in Ephemeral Setup and Leakage Scenarios [J]. INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2019, 2019, 11879 : 310 - 324
- [35] A Provably Secure Identity-Based Key Agreement Protocol from Key Encapsulation Scheme [J]. PROCEEDINGS OF THE 2012 EIGHTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS 2012), 2012, : 636 - 640
- [37] MIDSCYK: An Efficient Provably Secure Multi-Recipient Identity-Based Signcryption Scheme [J]. ICNM: 2009 INTERNATIONAL CONFERENCE ON NETWORKING & MEDIA CONVERGENCE, 2007, : 70 - 75
- [38] A Provably Secure and Efficient Identity-Based Anonymous Authentication Scheme for Mobile Edge Computing [J]. IEEE SYSTEMS JOURNAL, 2020, 14 (01): : 560 - 571
- [39] Provably Secure and Efficient Multi-Receiver Identity-Based Generalized Signcryption Scheme [J]. 2014 NINTH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIA JCIS), 2014, : 82 - 88
- [40] Provably Secure Identity-Based Signcryption Scheme for Crowdsourced Industrial Internet of Things Environments [J]. IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (04): : 2904 - 2914