Comments on 'Efficient revocable certificateless encryption secure in the standard model'

被引:0
|
作者
Tang, Ying-Kai [1 ]
Chow, Sherman S.M. [1 ]
Liu, Joseph K. [2 ]
机构
[1] Department of Information Engineering, Chinese University of Hong Kong, Sha Tin, Hong Kong
[2] Institute for Infocomm Research, Singapore
来源
Computer Journal | 2015年 / 58卷 / 04期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:779 / 781
相关论文
共 50 条
  • [31] An Efficient and Provable Secure Revocable Identity-Based Encryption Scheme
    Wang, Changji
    Li, Yuan
    Xia, Xiaonan
    Zheng, Kangjia
    PLOS ONE, 2014, 9 (09):
  • [32] Cryptanalysis and improvement of a certificateless encryption scheme in the standard model
    Lin Cheng
    Qiaoyan Wen
    Zhengping Jin
    Hua Zhang
    Frontiers of Computer Science, 2014, 8 : 163 - 173
  • [33] Cryptanalysis and improvement of a certificateless encryption scheme in the standard model
    Lin CHENG
    Qiaoyan WEN
    Zhengping JIN
    Hua ZHANG
    Frontiers of Computer Science, 2014, 8 (01) : 163 - 173
  • [34] Cryptanalysis and improvement of a certificateless encryption scheme in the standard model
    Cheng, Lin
    Wen, Qiaoyan
    Jin, Zhengping
    Zhang, Hua
    FRONTIERS OF COMPUTER SCIENCE, 2014, 8 (01) : 163 - 173
  • [35] An Efficient Certificateless Signcryption in the Standard Model
    Zheng, Xiao
    Li, Xudong
    PROCEEDINGS OF 2016 IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND BIG DATA ANALYSIS (ICCCBDA 2016), 2016, : 199 - 205
  • [36] Efficient Certificateless KEM in the Standard Model
    Lippold, Georg
    Boyd, Colin
    Nieto, Juan Manuel Gonzalez
    INFORMATION SECURITY AND CRYPTOLOGY - ISISC 2009, 2010, 5984 : 34 - 46
  • [37] An Improved Certificateless Signature Scheme Secure in the Standard Model
    Xiong, Hu
    Qin, Zhiguang
    Li, Fagen
    FUNDAMENTA INFORMATICAE, 2008, 88 (1-2) : 193 - 206
  • [38] Certificateless Threshold Decryption Scheme Secure in the Standard Model
    Zhang, Guoyan
    2009 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 2, 2009, : 414 - 418
  • [39] Revocable identity-based matchmaking encryption in the standard model
    Jiang, Zhe
    Wang, Xiwen
    Zhang, Kai
    Gong, Junqing
    Chen, Jie
    Qian, Haifeng
    IET INFORMATION SECURITY, 2023, 17 (04) : 567 - 581
  • [40] An efficient and provably secure certificateless key insulated encryption with applications to mobile internet
    He L.
    Yuan C.
    Xiong H.
    Qin Z.
    International Journal of Network Security, 2017, 19 (06) : 940 - 949