Self-enforcing ID-based broadcast encryption scheme

被引:0
|
作者
Ministry of Education Key Lab. of Computer Networks and Info. Security, Xidian Univ., Xi'an710071, China [1 ]
机构
来源
Sichuan Daxue Xuebao (Gongcheng Kexue Ban) | 2007年 / 3卷 / 133-135期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [31] Group ID-Based Encryption with Equality Test
    Ling, Yunhao
    Ma, Sha
    Huang, Qiong
    Xiang, Ru
    Li, Ximing
    INFORMATION SECURITY AND PRIVACY, ACISP 2019, 2019, 11547 : 39 - 57
  • [32] ID-based digital multisignature scheme
    Dept. of Comp. Sci. and Engineering, South China University of Technology, Guangzhou, Guangdong Province 510640, China
    不详
    J. Circuits Syst. Comput., 3-4 (223-227):
  • [33] New ID-based identification scheme
    Li, Yan-Ping
    Su, Wan-Li
    Wang, Yu-Min
    Harbin Gongcheng Daxue Xuebao/Journal of Harbin Engineering University, 2009, 30 (01): : 86 - 90
  • [34] THEORY OF SELF-ENFORCING AGREEMENTS
    TELSER, LG
    JOURNAL OF BUSINESS, 1980, 53 (01): : 27 - 44
  • [35] Is there a self-enforcing monetary constitution?
    Salter, Alexander William
    CONSTITUTIONAL POLITICAL ECONOMY, 2014, 25 (03) : 280 - 300
  • [36] Revocable ID-based signcryption scheme
    Liu, Zhenhua
    Li, Juanjuan
    Zu, Longhui
    Sichuan Daxue Xuebao (Gongcheng Kexue Ban)/Journal of Sichuan University (Engineering Science Edition), 2014, 46 (02): : 79 - 86
  • [37] ID-based digital multisignature scheme
    Tang, SH
    Wei, G
    JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 1999, 9 (3-4) : 223 - 227
  • [38] A new ID-based multi-recipient public-key encryption scheme
    Pang, L. (ljpang@mail.xidian.edu.cn), 1600, Chinese Institute of Electronics (22):
  • [39] A New ID-based Multi-Recipient Public-key Encryption Scheme
    Pang Liaojun
    Gao Lu
    Pei Qingqi
    Gui Jingjing
    Wang Yumin
    CHINESE JOURNAL OF ELECTRONICS, 2013, 22 (01): : 89 - 92
  • [40] Efficient ID-Based Proxy Pre-Encryption Scheme for Data Sharing in Cloud
    Zhang, Jian-Hong
    Zhen, Wei-Na
    Zhao, Xu-Bing
    INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND INFORMATION SECURITY (CNIS 2015), 2015, : 378 - 383