共 50 条
- [41] A strong anonymity threshold signature scheme based on DAA Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2010, 32 (03): : 693 - 699
- [42] Anonymity-revoking blind proxy signature scheme Jisuanji Xuebao/Chinese Journal of Computers, 2003, 26 (01): : 51 - 54
- [43] Ring signature based on ElGamal signature WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, PROCEEDINGS, 2006, 4138 : 445 - 456
- [44] Nominative signature from ring signature ADVANCES IN INFORMATION AND COMPUTER SECURITY, PROCEEDINGS, 2007, 4752 : 396 - +
- [45] Ring signature scheme from multilinear maps in the standard model 2015 10TH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC), 2015, : 859 - 864
- [47] New identity-based ring signature in the standard model Dianzi Yu Xinxi Xuebao, 2009, 7 (1727-1731): : 1727 - 1731
- [48] Extendable Threshold Ring Signatures with Enhanced Anonymity PUBLIC-KEY CRYPTOGRAPHY - PKC 2023, PT I, 2023, 13940 : 281 - 311
- [49] A Fuzzy Anonymity Analysis Model for Mobility in Anonymity System PROCEEDINGS OF THE INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, 2008, : 254 - 257
- [50] Hiding in Plain Sight: Exploiting Broadcast for Practical Host Anonymity 43RD HAWAII INTERNATIONAL CONFERENCE ON SYSTEMS SCIENCES VOLS 1-5 (HICSS 2010), 2010, : 952 - +