Provably secure identity-based commitment from lattice

被引:0
|
作者
Sun, Weiwei [1 ]
Yang, Bo [2 ]
Huang, Qiong [1 ]
Xia, Feng [1 ]
机构
[1] College of Informatics, South China Agricultural University, Guangzhou 510642, China
[2] School of Computer Science, Shaanxi Normal University, Xi'an 710062, China
来源
关键词
16;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:3679 / 3687
相关论文
共 50 条
  • [11] A Provably Secure Identity-Based Key Agreement Protocol from Key Encapsulation Scheme
    Cai, Yang
    Xu, Qiuliang
    Zheng, Zhihua
    PROCEEDINGS OF THE 2012 EIGHTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS 2012), 2012, : 636 - 640
  • [12] An Improved Provably Secure Identity-Based Authenticated Key Agreement Protocol
    Li, Yang
    Zhu, Jianming
    Zhang, Wei
    Yang, Xin
    2014 INTERNATIONAL CONFERENCE ON MANAGEMENT OF E-COMMERCE AND E-GOVERNMENT (ICMECG), 2014, : 98 - 103
  • [13] Provably secure identity-based undeniable signatures with selective and universal convertibility
    Wu, Wei
    Mu, Yi
    Susilo, Willy
    Huang, Xinyi
    INFORMATION SECURITY AND CRYPTOLOGY, 2008, 4990 : 25 - 39
  • [14] Provably secure identity-based aggregate signcryption scheme in random oracles
    Kar, Jayaprakash
    International Journal of Network Security, 2015, 17 (05) : 580 - 587
  • [15] Provably Secure Identity-Based Encryption and Signature over Cyclotomic Fields
    Wang, Yang
    Wang, Mingqiang
    Zou, Jingdan
    Xu, Jin
    Wang, Jing
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2019, 2019
  • [16] Efficient and provably secure multi-receiver identity-based signcryption
    Duan, Shanshan
    Cao, Zhenfu
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2006, 4058 : 195 - 206
  • [17] A Provably Secure Identity-based Authentication Multiple Key Agreement Protocol
    Tan Zuowen
    CHINA COMMUNICATIONS, 2011, 8 (02) : 26 - 33
  • [18] An efficient and provably secure identity-based signature scheme in the standard model
    Li, Ji-Guo
    Jiang, Ping-Jin
    Jisuanji Xuebao/Chinese Journal of Computers, 2009, 32 (11): : 2130 - 2136
  • [19] PROVABLY SECURE KEY-UPDATING SCHEMES IN IDENTITY-BASED SYSTEMS
    SHINOZAKI, S
    ITOH, T
    FUJIOKA, A
    TSUJII, S
    LECTURE NOTES IN COMPUTER SCIENCE, 1991, 473 : 16 - 30
  • [20] Efficient forward secure identity-based shorter signature from lattice
    Zhang, Xiaojun
    Xu, Chunxiang
    Jin, Chunhua
    Xie, Run
    COMPUTERS & ELECTRICAL ENGINEERING, 2014, 40 (06) : 1963 - 1971