共 50 条
- [2] Identity based proxy-signcryption scheme from pairings [J]. 2004 IEEE INTERNATIONAL CONFERENCE ON SERVICES COMPUTING, PROCEEDINGS, 2004, : 494 - 497
- [3] Efficient Identity Based Multi-Signcryption Scheme with Public Verifiability [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2014, 17 (02): : 181 - 190
- [4] An efficient multi-sender identity based threshold signcryption with public verifiability [J]. EIGHTH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES, PROCEEDINGS, 2007, : 149 - +
- [5] AN IDENTITY BASED RING SIGNCRYPTION SCHEME WITH PUBLIC VERIFIABILITY [J]. SECRYPT 2010: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2010, : 362 - 371
- [6] Identity-based proxy signcryption schemes [J]. INFORMATION SCIENCE AND MANAGEMENT ENGINEERING, VOLS 1-3, 2014, 46 : 1237 - 1242
- [7] The efficient proxy-protected proxy-signcryption scheme based on the ECKCDSA for mobile environment [J]. 6TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL X, PROCEEDINGS: MOBILE/WIRELESS COMPUTING AND COMMUNICATION SYSTEMS II, 2002, : 26 - 30
- [8] IBASC: Identity based aggregate signcryption scheme with public verifiability [J]. ICIC Express Letters, 2013, 7 (07): : 2075 - 2080
- [9] On the Security of Identity Based Ring Signcryption Schemes [J]. INFORMATION SECURITY, PROCEEDINGS, 2009, 5735 : 310 - 325