共 50 条
- [31] IDENTITY-BASED XTR BLIND SIGNATURE SCHEME INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2013, 19 (02): : 143 - 149
- [32] Identity-based signature scheme based on quadratic residues Science in China Series F: Information Sciences, 2007, 50 : 373 - 380
- [33] Identity-based signature scheme based on quintic residues PROCEEDINGS OF THE 2ND ANNUAL INTERNATIONAL CONFERENCE ON ELECTRONICS, ELECTRICAL ENGINEERING AND INFORMATION SCIENCE (EEEIS 2016), 2016, 117 : 836 - 841
- [34] Identity-based signature scheme based on quadratic residues SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 2007, 50 (03): : 373 - 380
- [37] Security Proofs for Identity-Based Identification and Signature Schemes Journal of Cryptology, 2009, 22 : 1 - 61
- [38] Security proofs for identity-based identification and signature schemes ADVANCES IN CRYPTOLOGY - EUROCRYPT 2004, PROCEEDINGS, 2004, 3027 : 268 - 286
- [39] Cryptanalysis of an Identity-Based Convertible Undeniable Signature Scheme PARADIGMS IN CRYPTOLOGY - MYCRYPT 2016: MALICIOUS AND EXPLORATORY CRYPTOLOGY, 2017, 10311 : 474 - 477
- [40] An identity-based proxy signature scheme from pairings INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2006, 4307 : 60 - 71