共 50 条
- [21] Security Analysis of a Convertible Multiauthenticated Encryption Scheme [J]. MICRO NANO DEVICES, STRUCTURE AND COMPUTING SYSTEMS, 2011, 159 : 111 - +
- [22] Improvement of a convertible undeniable partially blind signature scheme [J]. 20TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 1, PROCEEDINGS, 2006, : 875 - +
- [23] An Efficient Convertible Undeniable Signature Scheme with Delegatable Verification [J]. INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS, 2010, 6047 : 276 - 293
- [24] On the security of the Lee-Chang group signature scheme and its derivatives [J]. INFORMATION SECURITY, PROCEEDINGS, 1999, 1729 : 47 - 51
- [25] Security analysis of Lin-Dou's group signature scheme [J]. Sichuan Daxue Xuebao (Gongcheng Kexue Ban)/Journal of Sichuan University (Engineering Science Edition), 2008, 40 (02): : 125 - 128
- [26] New convertible undeniable signature scheme's and attack models [J]. 6TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL XV, PROCEEDINGS: MOBILE/WIRELESS COMPUTING AND COMMUNICATION SYSTEMS III, 2002, : 107 - 112
- [28] Cryptanalysis of an Identity-Based Convertible Undeniable Signature Scheme [J]. PARADIGMS IN CRYPTOLOGY - MYCRYPT 2016: MALICIOUS AND EXPLORATORY CRYPTOLOGY, 2017, 10311 : 474 - 477
- [29] On the security of a Certificateless Signature Scheme [J]. COMPUTER AND INFORMATION TECHNOLOGY, 2014, 519-520 : 965 - 968