Provably secure identity-based commitment from lattice

被引:0
|
作者
Sun, Weiwei [1 ]
Yang, Bo [2 ]
Huang, Qiong [1 ]
Xia, Feng [1 ]
机构
[1] College of Informatics, South China Agricultural University, Guangzhou 510642, China
[2] School of Computer Science, Shaanxi Normal University, Xi'an 710062, China
来源
关键词
16;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:3679 / 3687
相关论文
共 50 条
  • [1] Efficient and identity-based signcryption with provably-secure
    Wen Y.
    Ma J.
    Moon S.
    International Journal of Digital Content Technology and its Applications, 2010, 4 (07) : 148 - 153
  • [2] Provably secure identity-based threshold unsigncryption scheme
    Yang, Bo
    Yu, Yong
    Li, Fagen
    Sun, Ying
    AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2007, 4610 : 114 - +
  • [3] Provably secure identity-based threshold key escrow from pairing
    Long, Yu
    Gong, Zheng
    Chen, Kefei
    Liu, Shengli
    International Journal of Network Security, 2009, 8 (03) : 227 - 234
  • [4] Provably secure identity-based identification and signature schemes from code assumptions
    Song, Bo
    Zhao, Yiming
    PLOS ONE, 2017, 12 (08):
  • [5] Provably Secure Identity-Based Threshold Decryption on Access Structure
    Qin, Huawang
    Zhu, Xiaohua
    Dai, Yuewei
    2014 TENTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2014, : 464 - 468
  • [6] Provably Secure Identity-based Group Key Exchange Protocol
    SangJae Moon
    中国通信, 2007, 4 (04) : 11 - 22
  • [7] Provably Secure Identity-based Group Key Exchange Protocol
    Cao Chunjie
    Ma Jianfeng
    SangJae Moon
    CHINA COMMUNICATIONS, 2007, 4 (04) : 11 - 22
  • [8] IBUOV, a Provably Secure Identity-Based UOV Signature Scheme
    Shen, Wuqiang
    Tang, Shaohua
    Xu, Lingling
    2013 IEEE 16TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE 2013), 2013, : 388 - 395
  • [9] A provably secure identity-based proxy ring signature based on RSA
    Asaar, Maryam Rajabzadeh
    Salmasizadeh, Mahmoud
    Susilo, Willy
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (07) : 1223 - 1236
  • [10] Efficient and provably-secure identity-based signatures and signcryption from bilinear maps
    Barreto, PSLM
    Libert, B
    McCullagh, N
    Quisquater, JJ
    ADVANCES IN CRYPTOLOGY ASIACRYPT 2005, 2005, 3788 : 515 - 532