共 50 条
- [1] An identity-based ring signature scheme from bilinear pairings [J]. 18TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2 (REGULAR PAPERS), PROCEEDINGS, 2004, : 182 - 185
- [2] An Identity-Based Proxy Signature from Bilinear Pairings [J]. 2009 WASE INTERNATIONAL CONFERENCE ON INFORMATION ENGINEERING, ICIE 2009, VOL II, 2009, : 14 - 17
- [4] An identity-based threshold ring signature scheme based on the bilinear pairings [J]. PROCEEDINGS OF THE FIRST INTERNATIONAL SYMPOSIUM ON DATA, PRIVACY, AND E-COMMERCE, 2007, : 233 - +
- [5] An identity-based proxy signature scheme from pairings [J]. INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2006, 4307 : 60 - 71
- [6] A VERIFIABLE PROXY SIGNATURE SCHEME BASED ON BILINEAR PAIRINGS WITH IDENTITY-BASED CRYPTOGRAPHIC APPROACHES [J]. INFORMATION TECHNOLOGY AND CONTROL, 2012, 41 (01): : 60 - 68
- [7] Practical Hidden Identity-based Signature Scheme from Bilinear Pairings [J]. PROCEEDINGS OF 2010 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (ICCSIT 2010), VOL 6, 2010, : 97 - 102
- [8] An efficient identity-based short signature scheme from bilinear pairings [J]. CIS: 2007 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PROCEEDINGS, 2007, : 725 - +
- [9] Identity-based proxy signature from pairings [J]. AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2007, 4610 : 22 - +