Comment on Wang et al.'s anonymous multi-receiver ID-based encryption scheme and its improved schemes

被引:0
|
作者
Institution of Imagine Process and Pattern Recognition, North China University of Technology, Beijing 100144, China [1 ]
机构
来源
Int. J. Intell. Inf. Database Syst. | 2013年 / 5卷 / 400-413期
关键词
D O I
10.1504/IJIIDS.2013.056386
中图分类号
学科分类号
摘要
13
引用
收藏
相关论文
共 49 条
  • [31] Universal Forgery on Shen et al.'s Linkable and Convertible ID-based Ring Signature Scheme
    Hwang, Shin-Jia
    INTELLIGENT SYSTEMS AND APPLICATIONS (ICS 2014), 2015, 274 : 2201 - 2204
  • [32] Cryptanalysis of Tso et al.'s ID-based tripartite authenticated key agreement protocol
    Lim, Meng-Hui
    Lee, Sanggon
    Moon, Sangjae
    INFORMATION SYSTEMS SECURITY, PROCEEDINGS, 2007, 4812 : 64 - +
  • [33] Cryptanalytic flaws in Oh et al.'s ID-based authenticated key agreement protocol
    Lim, Meng-Hui
    Lee, Sanggon
    Lee, Hoonjae
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2008, PT 2, PROCEEDINGS, 2008, 5073 : 458 - +
  • [34] Cryptanalysis of Bohio et al.'s ID-Based Broadcast Signcryption (IBBSC) Scheme for Wireless Ad-hoc Networks
    Selvi, S. Sharmila Deva
    Vivek, S. Sree
    Karuturi, Naga Naresh
    Gopalakrishnan, Ragavendran
    Chandrasekaran, Pandu Rangan
    SIXTH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST, PROCEEDINGS, 2008, : 109 - 120
  • [35] Attack on Han et al.'s ID-based confirmer (undeniable) signature at ACM-EC'03
    Zhang, FG
    Safavi-Naini, R
    Susilo, W
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 170 (02) : 1166 - 1169
  • [36] On the Security of Luo et al.'s Fully Secure Hierarchical Identity Based Encryption Scheme
    Lee, Kwangsu
    Park, Jong Hwan
    Lee, Dong Hoon
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2012, E95A (09) : 1631 - 1636
  • [37] An Improved Biometric Multi-Server Authentication Scheme for Chang et al.'s Protocol
    Irshad, Azeem
    Chaudhry, Shehzad Ashraf
    Shafiq, Muhammad
    Usman, Muhammad
    Asif, Muhammad
    Ali, Sajid
    Kumari, Saru
    INFORMATION TECHNOLOGY AND CONTROL, 2019, 48 (02): : 211 - 224
  • [38] A Secure and Efficient TMIS-Based Authentication Scheme Improved Against Zhang et al.'s Scheme
    Alzahrani, Bander A.
    Irshad, Azeem
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2018, 43 (12) : 8239 - 8253
  • [39] A Secure and Efficient TMIS-Based Authentication Scheme Improved Against Zhang et al.’s Scheme
    Bander A. Alzahrani
    Azeem Irshad
    Arabian Journal for Science and Engineering, 2018, 43 : 8239 - 8253
  • [40] Cryptanalysis to Ming et al.'s Revocable Multi-Authority Attribute-Based Encryption
    Tseng, Yi-Fan
    Yang, Hao-Yu
    Wu, Chieh-Han
    Chien, Tsung-Yu
    Tso, Raylin
    Liu, Zi-Yuan
    Hsu, Jen-Chieh
    2022 17TH ASIA JOINT CONFERENCE ON INFORMATION SECURITY, ASIAJCIS, 2022, : 29 - 32