Leakage resilient identity-based aggregate signcryption

被引:0
|
作者
College of Computer, Nanjing University of Posts and Telecommunications, Nanjing [1 ]
210023, China
机构
来源
Beijing Youdian Daxue Xuebao | 1600年 / 5卷 / 20-25期
关键词
406 Highway Engineering - 412.2 Concrete Reinforcements - 723 Computer Software; Data Handling and Applications - 922.1 Probability Theory;
D O I
暂无
中图分类号
学科分类号
摘要
15
引用
收藏
相关论文
共 50 条
  • [41] Strong Forward Security in Identity-Based Signcryption
    Muniz, Madeline Gonzalez
    Laud, Peeter
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2013, 16 (4-5): : 235 - 258
  • [42] Efficient Identity-Based Signcryption in the Standard Model
    Li, Fagen
    Bin Muhaya, Fahad
    Zhang, Mingwu
    Takagi, Tsuyoshi
    PROVABLE SECURITY, 2011, 6980 : 120 - +
  • [43] A computational review of identity-based signcryption schemes
    Mandal, Murari
    Sharma, Gaurav
    Verma, Anil K.
    International Journal of Network Security, 2016, 18 (05) : 969 - 977
  • [44] An Improved Identity-Based Ring Signcryption Scheme
    Deng, Lunzhi
    Liu, Chenglian
    Wang, Xiangbin
    INFORMATION SECURITY JOURNAL, 2013, 22 (01): : 46 - 54
  • [45] Secure identity-based signcryption in the standard model
    Li, Fagen
    Takagi, Tsuyoshi
    MATHEMATICAL AND COMPUTER MODELLING, 2013, 57 (11-12) : 2685 - 2694
  • [46] A new identity-based ring signcryption scheme
    Deng, Lunzhi, 1600, Inderscience Enterprises Ltd., 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland (06):
  • [47] Continuous Leakage-Resilient Identity-Based Encryption without Random Oracles
    Zhou, Yanwei
    Yang, Bo
    Mu, Yi
    COMPUTER JOURNAL, 2018, 61 (04): : 586 - 600
  • [48] Leakage-Resilient Anonymous Identity-Based Broadcast Encryption in the Standard Model
    Zhang, Leyou
    Wang, Zhuanning
    Wu, Qing
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2015, 2015, 9532 : 201 - 210
  • [49] Continuous Leakage-Resilient Identity-Based Encryption Scheme with CCA Security
    Zhou Yanwei
    Yang Bo
    CHINESE JOURNAL OF ELECTRONICS, 2019, 28 (04) : 682 - 689
  • [50] A Leakage-Resilient CCA-Secure Identity-Based Encryption Scheme
    Li, Jiguo
    Teng, Meilin
    Zhang, Yichen
    Yu, Qihong
    COMPUTER JOURNAL, 2016, 59 (07): : 1066 - 1075