共 50 条
- [31] Secure delegation-by-warrant ID-based proxy signcryption scheme COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 445 - 450
- [32] Improvement of an ID-based Proxy Signature Scheme Without Trusted PKG 2015 16TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD), 2015, : 171 - 174
- [33] Secure ID-based proxy signcryption scheme with designated proxy signcrypter MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 351 - 355
- [34] ID-based threshold proxy signcryption scheme from bilinear pairings Int. J. Secur. Netw., 2008, 3 (206-215):
- [36] An efficient ID-based multi-proxy multi-signature scheme FIRST INTERNATIONAL MULTI-SYMPOSIUMS ON COMPUTER AND COMPUTATIONAL SCIENCES (IMSCCS 2006), PROCEEDINGS, VOL 2, 2006, : 81 - +
- [37] Efficient forward and provably secure ID-based signcryption scheme with public verifiability and public ciphertext authenticity INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2003, 2004, 2971 : 352 - 369
- [38] An efficient multi-PKG online/offline identity-based encryption scheme for wireless sensor network Sensors and Transducers, 2013, 157 (10): : 121 - 128
- [39] An efficient hierarchical ID-Based signature scheme Proceedings of the 11th Joint International Computer Conference, 2005, : 92 - 95