共 50 条
- [1] An Efficient and Provably Secure ID-Based Threshold Signcryption Scheme [J]. 2008 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLS 1 AND 2: VOL 1: COMMUNICATION THEORY AND SYSTEM, 2008, : 547 - 551
- [3] The Analysis of an Efficient and Provably Secure ID-Based Threshold Signcryption Scheme and Its Secure Version [J]. PROVABLE SECURITY, 2008, 5324 : 210 - +
- [4] Provably secure and ID-based group signature scheme [J]. 18TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2 (REGULAR PAPERS), PROCEEDINGS, 2004, : 384 - 388
- [5] Efficient forward and provably secure ID-based signcryption scheme with public verifiability and public ciphertext authenticity [J]. INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2003, 2004, 2971 : 352 - 369
- [6] Efficient Provable Secure ID-based Anonymous Signcryption Scheme [J]. PROCEEDINGS OF THE 2009 PACIFIC-ASIA CONFERENCE ON CIRCUITS, COMMUNICATIONS AND SYSTEM, 2009, : 415 - 418
- [7] An ID-Based Broadcast Signcryption Scheme Secure in the Standard Model [J]. SECURITY TECHNOLOGY, 2011, 259 : 123 - 127
- [8] Secure delegation-by-warrant ID-based proxy signcryption scheme [J]. COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 445 - 450
- [9] Secure ID-based proxy signcryption scheme with designated proxy signcrypter [J]. MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 351 - 355
- [10] AN EFFICIENT AND PROVABLY SECURE ID-BASED SIGNATURE SCHEME WITH BATCH VERIFICATIONS [J]. INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2009, 5 (11A): : 3911 - 3922