Improved group signature scheme based on Chinese remainder theorem

被引:0
|
作者
School of Computer Science and Technology, Beijing University of Aeronautics and Astronautics, Beijing 100191, China [1 ]
机构
来源
Dongnan Daxue Xuebao | 2008年 / SUPPL. 1卷 / 34-38期
关键词
Authentication;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [22] Proactive Weighted Threshold Signature Based on Generalized Chinese Remainder Theorem
    Chin-Chen Chang
    Journal of Electronic Science and Technology, 2012, (03) : 250 - 255
  • [23] An Improved Method for Database Encryption Based on the Chinese Remainder Theorem
    Dai Guoyong
    Chen Qingzhang
    Xia Ming
    ICCSE 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION, 2008, : 588 - 590
  • [24] Chinese Remainder Theorem Based DTN Group Key Management
    Xu, Guoyu
    Chen, Xingyuan
    Du, Xuehui
    PROCEEDINGS OF 2012 IEEE 14TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, 2012, : 779 - 783
  • [25] A Threshold Secret Sharing Scheme Based on LMCA and Chinese Remainder Theorem
    Lu, Dianjun
    Wang, Yu
    Zhang, Xiaoqin
    Ji, Lanfen
    PROCEEDINGS OF 2016 9TH INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN (ISCID), VOL 2, 2016, : 439 - 442
  • [26] BPCRT: Bivariate Polynomial and Chinese Remainder Theorem Based Group Key Management Scheme for Sensor Networks
    Zhang, Jianmin
    Deng, Dazhi
    2ND INTERNATIONAL SYMPOSIUM ON COMPUTER NETWORK AND MULTIMEDIA TECHNOLOGY (CNMT 2010), VOLS 1 AND 2, 2010, : 414 - 417
  • [27] A Reversible Sketch Based on Chinese Remainder Theorem: Scheme and Performance Study
    Adiga, B. S.
    Shastry, Ravishankara
    Chandra, M. Girish
    Rajan, M. A.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2011, 11 (08): : 59 - 65
  • [28] A Threshold Encryption Scheme without a Dealer Based on Chinese Remainder Theorem
    Shi, Nan
    Hou, Zhengfeng
    Tan, Mengna
    Shao, Kun
    Zhu, Xiaoling
    2017 IEEE 9TH INTERNATIONAL CONFERENCE ON COMMUNICATION SOFTWARE AND NETWORKS (ICCSN), 2017, : 90 - 96
  • [29] Lattice-Based Secret Sharing Scheme (Chinese Remainder Theorem)
    Dong, Songshou
    Yao, Yanqing
    Zhou, Yihua
    Yang, Yuguang
    DIGITAL FORENSICS AND CYBER CRIME, PT 2, ICDF2C 2023, 2024, 571 : 54 - 62
  • [30] An Efficient Location Privacy Protection Scheme Based on the Chinese Remainder Theorem
    Wang, Jingjing
    Han, Yiliang
    Yang, Xiaoyuan
    TSINGHUA SCIENCE AND TECHNOLOGY, 2016, 21 (03) : 260 - 269