共 50 条
- [21] An Efficient and Provably Secure ID-Based Threshold Signcryption Scheme 2008 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLS 1 AND 2: VOL 1: COMMUNICATION THEORY AND SYSTEM, 2008, : 547 - 551
- [22] Secure delegation-by-warrant ID-based proxy signcryption scheme COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 445 - 450
- [23] Secure ID-based proxy signcryption scheme with designated proxy signcrypter MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 351 - 355
- [24] ID-based threshold proxy signcryption scheme from bilinear pairings Int. J. Secur. Netw., 2008, 3 (206-215):
- [26] An ID-Based Anonymous Signcryption Scheme for Multiple Receivers Secure in the Standard Model ADVANCES IN COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, PROCEEDINGS, 2010, 6059 : 15 - 27
- [27] A New Multi-Receiver ID-Based Signcryption Scheme for Group Communications 2009 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLUMES I & II: COMMUNICATIONS, NETWORKS AND SIGNAL PROCESSING, VOL I/ELECTRONIC DEVICES, CIRUITS AND SYSTEMS, VOL II, 2009, : 296 - 300
- [28] An Improved ID-Based Multi-Proxy Multi-Signcryption Scheme PROCEEDINGS OF THE SECOND INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, VOL I, 2009, : 466 - +
- [30] ID-based Signcryption KEM to Multiple Recipients CHINESE JOURNAL OF ELECTRONICS, 2011, 20 (02): : 317 - 322