共 50 条
- [1] An ID-based efficient signcryption key encapsulation scheme 2008 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES, 2008, : 18 - +
- [2] An Efficient ID-Based Ring Signcryption Scheme 2008 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLS 1 AND 2: VOL 1: COMMUNICATION THEORY AND SYSTEM, 2008, : 542 - 546
- [3] Revocable ID-based signcryption scheme Sichuan Daxue Xuebao (Gongcheng Kexue Ban)/Journal of Sichuan University (Engineering Science Edition), 2014, 46 (02): : 79 - 86
- [4] Efficient Provable Secure ID-based Anonymous Signcryption Scheme PROCEEDINGS OF THE 2009 PACIFIC-ASIA CONFERENCE ON CIRCUITS, COMMUNICATIONS AND SYSTEM, 2009, : 415 - 418
- [5] An ID-based broadcast signcryption scheme Sichuan Daxue Xuebao (Gongcheng Kexue Ban)/Journal of Sichuan University (Engineering Science Edition), 2012, 44 (01): : 118 - 122
- [6] An efficient multi-PKG ID-based signcryption scheme Xu, Q.-L. (xql@sdu.edu.cn), 2012, Science Press (35):
- [7] An Efficient and Provably Secure ID-Based Threshold Signcryption Scheme 2008 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLS 1 AND 2: VOL 1: COMMUNICATION THEORY AND SYSTEM, 2008, : 547 - 551
- [8] A Novel ID-Based Anonymous Signcryption Scheme ADVANCES IN DATA AND WEB MANAGEMENT, PROCEEDINGS, 2009, 5446 : 604 - 610
- [9] Comment on an ID-based Broadcast Signcryption Scheme 2009 INTERNATIONAL CONFERENCE ON NETWORKING AND DIGITAL SOCIETY, VOL 1, PROCEEDINGS, 2009, : 37 - 40
- [10] An ID-based proxy signcryption scheme with fast revocation Dianzi Yu Xinxi Xuebao, 2008, 3 (672-675):