共 50 条
- [11] Relations between the security models for certificateless encryption and ID-based key agreement International Journal of Information Security, 2012, 11 : 1 - 22
- [13] DEVELOPMENT ON SECURITY MODELS FOR PROXY RE-ENCRYPTION SCHEMES JP JOURNAL OF ALGEBRA NUMBER THEORY AND APPLICATIONS, 2024, 63 (01): : 1 - 21
- [14] Security Model for Certificateless Aggregate Signature Schemes 2008 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, VOLS 1 AND 2, PROCEEDINGS, 2008, : 925 - 929
- [17] On the Security of a Certificateless Public Key Encryption with Keyword Search ADVANCES IN INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PT I, 2018, 81 : 191 - 197
- [18] On the Security of a Certificateless Searchable Public Key Encryption Scheme GENETIC AND EVOLUTIONARY COMPUTING, 2017, 536 : 113 - 119
- [19] Security of Encryption Schemes in Weakened Random Oracle Models (Extended Abstract) PUBLIC KEY CRYPTOGRAPHY - PKC 2010, PROCEEDINGS, 2010, 6056 : 403 - 419
- [20] Security analysis and improvements of certificateless aggregate signature schemes Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2015, 37 (08): : 1994 - 1999