共 50 条
- [1] ID-based threshold unsigncryption scheme from pairings INFORMATION SECURITY AND CRYPTOLOGY, PROCEEDINGS, 2005, 3822 : 242 - 253
- [2] Revocable ID-based signcryption scheme Sichuan Daxue Xuebao (Gongcheng Kexue Ban)/Journal of Sichuan University (Engineering Science Edition), 2014, 46 (02): : 79 - 86
- [3] An ID-based broadcast signcryption scheme Sichuan Daxue Xuebao (Gongcheng Kexue Ban)/Journal of Sichuan University (Engineering Science Edition), 2012, 44 (01): : 118 - 122
- [4] A Novel ID-Based Anonymous Signcryption Scheme ADVANCES IN DATA AND WEB MANAGEMENT, PROCEEDINGS, 2009, 5446 : 604 - 610
- [5] Comment on an ID-based Broadcast Signcryption Scheme 2009 INTERNATIONAL CONFERENCE ON NETWORKING AND DIGITAL SOCIETY, VOL 1, PROCEEDINGS, 2009, : 37 - 40
- [6] An Efficient ID-Based Ring Signcryption Scheme 2008 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLS 1 AND 2: VOL 1: COMMUNICATION THEORY AND SYSTEM, 2008, : 542 - 546
- [7] An ID-based proxy signcryption scheme with fast revocation Dianzi Yu Xinxi Xuebao, 2008, 3 (672-675):
- [9] ID-based efficient signcryption key encapsulation scheme Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2009, 46 (05): : 857 - 863
- [10] A provably secure ID-based mediated signcryption scheme SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 3, PROCEEDINGS, 2007, : 647 - +