Efficient ID-based certificateless signature scheme

被引:0
|
作者
Key Laboratory of Computer Network and Information Security, Xidian University, Xi'an 710071, China [1 ]
机构
来源
Tongxin Xuebao | 2008年 / 2卷 / 87-94期
关键词
Cryptography;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [1] An efficient hierarchical ID-Based signature scheme
    Yu, J
    Li, DX
    Hao, R
    Proceedings of the 11th Joint International Computer Conference, 2005, : 92 - 95
  • [2] Efficient ID-Based Proxy Blind Signature Scheme
    ZHANG Qing1
    2. School of Computer
    WuhanUniversityJournalofNaturalSciences, 2007, (01) : 105 - 108
  • [3] Efficient ID-based Threshold Ring Signature scheme
    Jiang Han
    Xu QiuLiang
    Chen Guohua
    EUC 2008: PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING, VOL 2, WORKSHOPS, 2008, : 437 - 442
  • [4] An efficient ID-based partially blind signature scheme
    Hu, Xiaoming
    Huang, Shangteng
    SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 3, PROCEEDINGS, 2007, : 291 - +
  • [5] An Efficient ID-based Proxy Ring Signature Scheme
    Wu Lei
    Li Daxing
    2009 WRI INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND MOBILE COMPUTING: CMC 2009, VOL 3, 2009, : 560 - +
  • [6] A NEW EFFICIENT ID-BASED PROXY BLIND SIGNATURE SCHEME
    Ming Yang Wang Yumin (State Key Lab of Integrated Service Network
    JournalofElectronics(China), 2008, (02) : 226 - 231
  • [7] An efficient ID-based restrictive partially blind signature scheme
    Hu, Xiaoming
    Huang, Shangteng
    SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 3, PROCEEDINGS, 2007, : 205 - +
  • [8] Efficient ID-Based Signature Scheme from Bilinear Map
    Sahu, Rajeev Anand
    Padhye, Sahadeo
    ADVANCES IN PARALLEL, DISTRIBUTED COMPUTING, 2011, 203 : 301 - 306
  • [9] An efficient ID-Based proxy signature scheme from pairings
    Gu, Chunxian
    Zhu, Yuefei
    INFORMATION SECURITY AND CRYPTOLOGY, 2008, 4990 : 40 - 50
  • [10] On the security of an efficient ID-based partially blind signature scheme
    Tseng, Yuh-Min
    Wu, Tsu-Yang
    Wu, Jui-Di
    IMECS 2008: INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS, VOLS I AND II, 2008, : 417 - 420