共 50 条
- [42] Improvement of ID-based proxy re-signature scheme with pairing-free [J]. Wireless Networks, 2019, 25 : 4319 - 4329
- [43] Efficient ID-based proxy multi-signature scheme secure in random oracle [J]. Frontiers of Computer Science, 2012, 6 : 421 - 428
- [44] An Improved ID-Based Multi-Proxy Multi-Signcryption Scheme [J]. PROCEEDINGS OF THE SECOND INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, VOL I, 2009, : 466 - +
- [45] ID-based Signature Scheme with Tight Reduction [J]. 2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 347 - 351
- [46] A Practical ID-Based Group Signature Scheme [J]. JOURNAL OF COMPUTERS, 2012, 7 (11) : 2650 - 2654
- [47] An efficient hierarchical ID-Based signature scheme [J]. Proceedings of the 11th Joint International Computer Conference, 2005, : 92 - 95
- [48] Novel ID-Based Group Signature Scheme [J]. 2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 12634 - 12637
- [49] An ID-based multi-signature scheme [J]. 2007 THIRD INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, VOL II, PROCEEDINGS, 2007, : 115 - 117
- [50] Secure ID-based proxy signcryption scheme with designated proxy signcrypter [J]. MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 351 - 355