共 50 条
- [31] Cryptanalysis of a secure and efficient identity-based signature scheme [J]. Ruan Jian Xue Bao/Journal of Software, 2014, 25 (05): : 1125 - 1131
- [32] Provably secure identity-based threshold unsigncryption scheme [J]. AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2007, 4610 : 114 - +
- [33] Design of Secure and Independent Controllable Email System Based on Identity-Based Cryptography [J]. 2016 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2016, : 217 - 222
- [34] SIMULATION OF AN IDENTITY-BASED CRYPTOGRAPHY SCHEME FOR AD HOC NETWORKS [J]. SECRYPT 2009: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2009, : 135 - 139
- [35] Secure and efficient identity-based threshold signcryption scheme [J]. Kongzhi yu Juece/Control and Decision, 2010, 25 (07): : 1031 - 1034
- [36] An efficient and full secure identity-based encryption scheme [J]. Shanghai Jiaotong Daxue Xuebao/Journal of Shanghai Jiaotong University, 2010, 44 (03): : 389 - 392
- [37] Multipurpose identity-based signcryption - A swiss army knife for identity-based cryptography [J]. ADVANCES IN CRYPTOLOGY-CRYPTO 2003, PROCEEDINGS, 2003, 2729 : 383 - 399
- [38] Multi-identity management for identity-based cryptography [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2008, 11 (06): : 639 - 672