共 50 条
- [1] IDENTITY-BASED KEY-INSULATED PROXY SIGNATURE [J]. Journal of Electronics(China), 2009, 26 (06) : 853 - 858
- [2] Identity-based key-insulated signature without random oracles [J]. COMPUTATIONAL INTELLIGENCE AND SECURITY, 2007, 4456 : 470 - +
- [3] Identity-based parallel key-insulated signature: Framework and construction [J]. JOURNAL OF RESEARCH AND PRACTICE IN INFORMATION TECHNOLOGY, 2008, 40 (01): : 55 - 68
- [4] Generic Construction of Identity-Based Strong Key-Insulated Signature [J]. JOURNAL OF INTERNET TECHNOLOGY, 2011, 12 (04): : 629 - 635
- [6] Identity-based key-insulated signature without random oracles [J]. 2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS, 2006, : 1253 - 1258
- [7] Identity-based parallel key-insulated signature: Framework and construction [J]. J. Res. Pract. Inf. Technol., 2008, 1 (55-68):
- [9] Identity-Based strong key-insulated signature without random oracles [J]. Ruan Jian Xue Bao, 2008, 6 (1555-1564):
- [10] Identity-based threshold key-insulated signature without random oracles [J]. Shanghai Jiaotong Daxue Xuebao/Journal of Shanghai Jiaotong University, 2013, 47 (08): : 1239 - 1245