共 50 条
- [1] Construction of Identity Based Signcryption Schemes INFORMATION SECURITY APPLICATIONS, 2011, 6513 : 1 - 14
- [2] On the Security of Identity Based Ring Signcryption Schemes INFORMATION SECURITY, PROCEEDINGS, 2009, 5735 : 310 - 325
- [3] Cryptanalysis of Two Identity Based Signcryption Schemes EIGHTH IEEE INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, PROCEEDINGS, 2009, : 292 - 294
- [4] Identity-based proxy signcryption schemes INFORMATION SCIENCE AND MANAGEMENT ENGINEERING, VOLS 1-3, 2014, 46 : 1237 - 1242
- [5] Leakage resilient identity-based aggregate signcryption Beijing Youdian Daxue Xuebao, 1600, 5 (20-25):
- [8] Cryptanalysis of two identity-based signcryption schemes 2011 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), VOLS 1-4, 2012, : 694 - 698
- [10] IBASC: Identity based aggregate signcryption scheme with public verifiability ICIC Express Letters, 2013, 7 (07): : 2075 - 2080