ID-based efficient signcryption key encapsulation scheme

被引:0
|
作者
Lai, Xin [1 ,2 ]
Huang, Xiaofang [3 ]
He, Dake [1 ]
机构
[1] Information Security and National Computing Grid Laboratory (IS and NC), South West Jiaotong University, Chengdu 610031, China
[2] School of Air Traffic Management, Civil Aviation Flight University of China, Guanghan 618307, China
[3] Information Security Center, Beijing University of Post and Telecommunications, Beijing 100876, China
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:857 / 863
相关论文
共 50 条
  • [21] An ID-based hybrid broadcast signcryption scheme with user anonymity
    Lin, Z.-Q., 2013, Sichuan University (45):
  • [22] Efficient ID-based TPM key loading scheme for trusted platform
    Song C.
    Liu B.
    Hu Z.-M.
    Xin Y.
    Yang Y.-X.
    Yin H.
    Journal of China Universities of Posts and Telecommunications, 2010, 17 (04): : 74 - 79
  • [23] The Analysis of an Efficient and Provably Secure ID-Based Threshold Signcryption Scheme and Its Secure Version
    Zhu, ZhenChao
    Zhang, Yuqing
    Wang, Fengjiao
    PROVABLE SECURITY, 2008, 5324 : 210 - +
  • [24] Efficient ID-Based Ring Signature and Ring Signcryption Schemes
    Zhu, Lijun
    Zhang, Futai
    2008 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, VOLS 1 AND 2, PROCEEDINGS, 2008, : 866 - 870
  • [26] Secure delegation-by-warrant ID-based proxy signcryption scheme
    Duan, SS
    Cao, ZF
    Zhou, Y
    COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 445 - 450
  • [27] Secure ID-based proxy signcryption scheme with designated proxy signcrypter
    Tian, Xiu-Xia
    Xu, Jian-Ping
    Li, Hong-Jiao
    Peng, Yuan
    Zhang, An-Qin
    MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 351 - 355
  • [28] ID-based threshold proxy signcryption scheme from bilinear pairings
    School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu 610054 Sichuan, China
    不详
    不详
    Int. J. Secur. Netw., 2008, 3 (206-215):
  • [29] LIGHTWEIGHT TRUSTED ID-BASED SIGNCRYPTION SCHEME FOR WIRELESS SENSOR NETWORKS
    Li, Zhimin
    Xu, Xin
    Fan, Zexiang
    INTERNATIONAL JOURNAL ON SMART SENSING AND INTELLIGENT SYSTEMS, 2012, 5 (04) : 799 - 810
  • [30] Security of ID-based key exchange scheme
    Scott, M
    ELECTRONICS LETTERS, 1998, 34 (07) : 653 - 654