Efficient ID-based certificateless signature scheme

被引:0
|
作者
Key Laboratory of Computer Network and Information Security, Xidian University, Xi'an 710071, China [1 ]
机构
来源
Tongxin Xuebao | 2008年 / 2卷 / 87-94期
关键词
Cryptography;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [21] ID-based, Proxy, Threshold Signature Scheme
    Pomykala, Jacek
    Kulakowski, Henryk
    Sapiecha, Piotr
    Grela, Blazej
    INTERNATIONAL JOURNAL OF ELECTRONICS AND TELECOMMUNICATIONS, 2021, 67 (02) : 201 - 205
  • [22] An ID-based multi-signature scheme
    Meng, Tao
    Zhang, Xinping
    Sun, Shenghe
    2007 THIRD INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, VOL II, PROCEEDINGS, 2007, : 115 - 117
  • [23] An Optimal Authentication Protocol Using Certificateless ID-Based Signature in MANET
    Kumar, Vimal
    Kumar, Rakesh
    SECURITY IN COMPUTING AND COMMUNICATIONS (SSCC 2015), 2015, 536 : 110 - 121
  • [24] Efficient ID-based blind signature schemes
    Ming, Yang
    Wang, Yumin
    PROCEEDINGS OF THE FIRST INTERNATIONAL SYMPOSIUM ON DATA, PRIVACY, AND E-COMMERCE, 2007, : 260 - 264
  • [25] Efficient ID-based Designated Verifier Signature
    Blazy, Olivier
    Conchon, Emmanuel
    Germouty, Paul
    Jambert, Amandine
    PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2017), 2017,
  • [26] A Secure and Efficient ID-Based Aggregate Signature Scheme for Wireless Sensor Networks
    Shen, Limin
    Ma, Jianfeng
    Liu, Ximeng
    Wei, Fushan
    Miao, Meixia
    IEEE INTERNET OF THINGS JOURNAL, 2017, 4 (02): : 546 - 554
  • [27] An efficient ID-based multi-proxy multi-signature scheme
    Guo, Sheng
    Cao, Zhenfu
    Lu, Rongxing
    FIRST INTERNATIONAL MULTI-SYMPOSIUMS ON COMPUTER AND COMPUTATIONAL SCIENCES (IMSCCS 2006), PROCEEDINGS, VOL 2, 2006, : 81 - +
  • [28] An Efficient ID-Based Directed Signature Scheme from Optimal Eta Pairing
    Ku, Junhua
    Yun, Dawei
    Zheng, Bing
    Wei, She
    COMPUTATIONAL INTELLIGENCE AND INTELLIGENT SYSTEMS, 2012, 316 : 440 - 448
  • [29] An Efficient Provable Secure ID-Based Proxy Signature Scheme Based on CDH Assumption
    柴震川
    曹珍富
    陆荣幸
    Journal of Shanghai Jiaotong University(Science), 2006, (03) : 271 - 278
  • [30] ID-based proxy signature scheme with message recovery
    Singh, Harendra
    Verma, Girraj Kumar
    JOURNAL OF SYSTEMS AND SOFTWARE, 2012, 85 (01) : 209 - 214