共 50 条
- [31] Strongly Unforgeable ID-Based Signatures without Random Oracles [J]. INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS: 5TH INTERNATIONAL CONFERENCE, ISPEC 2009, 2009, 5451 : 35 - +
- [32] Identity-Based Proxy Verifiably Encrypted Signature Scheme [J]. CHINA COMMUNICATIONS, 2012, 9 (11) : 137 - 149
- [33] A Novel ID-Based Strong Designated Verifier Signature Scheme [J]. ADVANCES IN MANUFACTURING TECHNOLOGY, PTS 1-4, 2012, 220-223 : 2870 - 2874
- [34] Improvement of an ID-based Proxy Signature Scheme Without Trusted PKG [J]. 2015 16TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD), 2015, : 171 - 174
- [35] An ID-Based Proxy Multi Signature Scheme without Bilinear Pairings [J]. SECURITY ASPECTS IN INFORMATION TECHNOLOGY, 2011, 7011 : 83 - 92
- [36] ID-based proxy blind signature [J]. 18TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2 (REGULAR PAPERS), PROCEEDINGS, 2004, : 380 - 383
- [37] Generic Constructions for Verifiably Encrypted Signatures without Random Oracles or NIZKs [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, 2010, 6123 : 69 - 86
- [38] Prom digital signature to ID-based identification/signature [J]. PUBLIC KEY CRYPTOGRAPHY - PKC 2004, PROCEEDINGS, 2004, 2947 : 248 - 261
- [39] ID-Based threshold signature and mediated signature schemes [J]. SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 1, PROCEEDINGS, 2007, : 473 - +