An efficient multi-PKG ID-based signcryption scheme

被引:0
|
作者
机构
[1] [1,Zhao, Xiu-Feng
[2] Xu, Qiu-Liang
来源
Xu, Q.-L. (xql@sdu.edu.cn) | 2012年 / Science Press卷 / 35期
关键词
Hash functions;
D O I
10.3724/SP.J.1016.2012.00673
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [21] On the security of provably secure multi-receiver ID-based signcryption scheme
    Tan, Chik-How
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2008, E91A (07) : 1836 - 1838
  • [22] An ID-based signcryption scheme for multiple receivers in standard model
    Qi Z.
    Yang G.
    Ren X.
    Wang H.
    Jiangsu Daxue Xuebao (Ziran Kexue Ban)/Journal of Jiangsu University (Natural Science Edition), 2011, 32 (05): : 573 - 577
  • [23] An Id-Based Server-Aided Designcryption Signcryption Scheme
    Lan, Caihui
    Li, Haifeng
    Wang, Caifen
    2015 8TH INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN (ISCID), VOL 2, 2015, : 95 - 99
  • [24] ID-based signcryption scheme using extended chaotic maps
    Wang Caifen
    Kang Burong
    2016 INTERNATIONAL SYMPOSIUM ON COMPUTER, CONSUMER AND CONTROL (IS3C), 2016, : 776 - 779
  • [25] An ID-Based Broadcast Signcryption Scheme Secure in the Standard Model
    Zhang, Bo
    SECURITY TECHNOLOGY, 2011, 259 : 123 - 127
  • [26] An ID-based signcryption scheme with compartmented secret sharing for unsigncryption
    Enos, Graham
    Zheng, Yuliang
    INFORMATION PROCESSING LETTERS, 2015, 115 (02) : 128 - 133
  • [27] An ID-based hybrid broadcast signcryption scheme with user anonymity
    Lin, Z.-Q., 2013, Sichuan University (45):
  • [28] The Analysis of an Efficient and Provably Secure ID-Based Threshold Signcryption Scheme and Its Secure Version
    Zhu, ZhenChao
    Zhang, Yuqing
    Wang, Fengjiao
    PROVABLE SECURITY, 2008, 5324 : 210 - +
  • [29] Efficient ID-Based Ring Signature and Ring Signcryption Schemes
    Zhu, Lijun
    Zhang, Futai
    2008 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, VOLS 1 AND 2, PROCEEDINGS, 2008, : 866 - 870
  • [30] New ID-based Proxy Blind Multi-Signature Scheme Without Trusted PKG
    Zhang, Xiaozhi
    Xi, Junfu
    Wang, Dongmei
    2011 INTERNATIONAL CONFERENCE ON ELECTRONICS, COMMUNICATIONS AND CONTROL (ICECC), 2011, : 352 - 355