共 50 条
- [41] An ID-Based Anonymous Signcryption Scheme for Multiple Receivers Secure in the Standard Model ADVANCES IN COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, PROCEEDINGS, 2010, 6059 : 15 - 27
- [42] Analysis of an ID-based Proxy Signature Scheme Without Trusted PKG and a Proxy Blind Multi-signature Scheme 2014 15TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD), 2014, : 167 - 170
- [43] An ID-based multi-signature scheme 2007 THIRD INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, VOL II, PROCEEDINGS, 2007, : 115 - 117
- [44] ID-based Signcryption KEM to Multiple Recipients CHINESE JOURNAL OF ELECTRONICS, 2011, 20 (02): : 317 - 322
- [45] Efficient ID-based proxy signature and proxy signcryption form bilinear pairings COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 167 - 172
- [48] Efficient ID-based Threshold Ring Signature scheme EUC 2008: PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING, VOL 2, WORKSHOPS, 2008, : 437 - 442
- [49] An efficient ID-based partially blind signature scheme SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 3, PROCEEDINGS, 2007, : 291 - +
- [50] An Efficient ID-based Proxy Ring Signature Scheme 2009 WRI INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND MOBILE COMPUTING: CMC 2009, VOL 3, 2009, : 560 - +