Short group signature with IND-CCA2 full-anonymity

被引:0
|
作者
Key Laboratory of Computer Network and Information Security, Xidian University, Xi'an 710071, China [1 ]
机构
来源
Jisuanji Xuebao | 2007年 / 10卷 / 1865-1871期
关键词
Security of data;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 20 条
  • [1] An IND-CCA2 Secure Certificateless Hybrid Signcryption
    Aravind Vishnu, S. S.
    Praveen, I.
    Sethumadhavan, M.
    WIRELESS PERSONAL COMMUNICATIONS, 2021, 119 (04) : 3589 - 3608
  • [2] An IND-CCA2 Secure Certificateless Hybrid Signcryption
    S. S. Aravind Vishnu
    I. Praveen
    M. Sethumadhavan
    Wireless Personal Communications, 2021, 119 : 3589 - 3608
  • [3] A Provable IND-CCA2 Secure Hybrid Encryption Scheme
    Qi Zhifeng
    Qing Sihan
    Cheng Guanghui
    2011 AASRI CONFERENCE ON INFORMATION TECHNOLOGY AND ECONOMIC DEVELOPMENT (AASRI-ITED 2011), VOL 1, 2011, : 254 - 257
  • [4] A Provable IND-CCA2 Secure Hybrid Encryption Scheme
    Qi Zhifeng
    Qing Sihan
    Cheng Guanghui
    2011 INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS AND NEURAL COMPUTING (FSNC 2011), VOL IV, 2011, : 254 - 257
  • [5] A note on an IND-CCA2 secure Paillier-based cryptosystem
    Galindo, David
    INFORMATION PROCESSING LETTERS, 2013, 113 (22-24) : 913 - 914
  • [6] A general construction of IND-CCA2 secure public key encryption
    Kiltz, E
    Malone-Lee, J
    CRYPTOGRAPHY AND CODING, PROCEEDINGS, 2003, 2898 : 152 - 166
  • [7] An efficient IND-CCA2 secure Paillier-based cryptosystem
    Das, Angsuman
    Adhikari, Avishek
    INFORMATION PROCESSING LETTERS, 2012, 112 (22) : 885 - 888
  • [8] A reject timing attack on an IND-CCA2 public-key cryptosystem
    Sakurai, K
    Takagi, T
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2002, 2002, 2587 : 359 - 373
  • [9] IND-CCA2完全匿名的高效短群签名方案
    马海英
    王占君
    王周秀
    计算机应用研究, 2009, 26 (05) : 1922 - 1925
  • [10] An IND-CCA2 Secure Key-Policy Attribute Based Key Encapsulation Scheme
    Wang, Changji
    Liu, Yang
    Kim, Jung-Tae
    MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 449 - +