Comment on Wang et al.'s anonymous multi-receiver ID-based encryption scheme and its improved schemes

被引:0
|
作者
Institution of Imagine Process and Pattern Recognition, North China University of Technology, Beijing 100144, China [1 ]
机构
来源
Int. J. Intell. Inf. Database Syst. | 2013年 / 5卷 / 400-413期
关键词
D O I
10.1504/IJIIDS.2013.056386
中图分类号
学科分类号
摘要
13
引用
收藏
相关论文
共 49 条
  • [11] ID-Based Anonymous Multi-receiver Key Encapsulation Mechanism with Sender Authentication
    Zhang, Bo
    Sun, Tao
    Yu, Dairong
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2014, PT II, 2014, 8631 : 645 - 658
  • [13] On the security of provably secure multi-receiver ID-based signcryption scheme
    Tan, Chik-How
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2008, E91A (07) : 1836 - 1838
  • [14] A New Multi-Receiver ID-Based Signcryption Scheme for Group Communications
    Li, Fagen
    Xiong, Hu
    Nie, Xuyun
    2009 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLUMES I & II: COMMUNICATIONS, NETWORKS AND SIGNAL PROCESSING, VOL I/ELECTRONIC DEVICES, CIRUITS AND SYSTEMS, VOL II, 2009, : 296 - 300
  • [15] Improved identity based multi-receiver anonymous signcryption scheme
    School of Information Science and Engineering, University of Jinan, Jinan
    250022, China
    不详
    250022, China
    不详
    250101, China
    Tongxin Xuebao, 9 (109-118):
  • [16] Insecurity of 'Improved Anonymous Multi-Receiver Identity-Based Encryption'
    Wang, Huaqun
    COMPUTER JOURNAL, 2014, 57 (04): : 636 - 638
  • [17] Cryptanalysis of Mu et al.'s and Li et al.'s Schemes and a Provably Secure ID-Based Broadcast Signcryption (IBBSC) Scheme
    Selvi, S. Sharmila Deva
    Vivek, S. Sree
    Gopalakrishnan, Ragavendran
    Karuturi, Naga Naresh
    Rangan, C. Pandu
    INFORMATION SECURITY APPLICATIONS, 2009, 5379 : 115 - 129
  • [18] Cryptanalysis and improvements of an anonymous multi-receiver identity-based encryption scheme
    Wang, H.
    Zhang, Y.
    Xiong, H.
    Qin, B.
    IET INFORMATION SECURITY, 2012, 6 (01) : 20 - 27
  • [19] On the security of an ID-based anonymous proxy signature scheme and its improved scheme
    Zhang, Jianhong
    Mao, Jian
    Xu, Yuwei
    INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS, 2013, 5 (03) : 181 - 188
  • [20] Attack on Libert et al.'s ID-Based Undeniable Signature Scheme
    Li Zichen
    Yan Yunsheng
    Zhang Juanmei
    CHINESE JOURNAL OF ELECTRONICS, 2008, 17 (04): : 748 - 750