An efficient multi-PKG ID-based signcryption scheme

被引:0
|
作者
机构
[1] [1,Zhao, Xiu-Feng
[2] Xu, Qiu-Liang
来源
Xu, Q.-L. (xql@sdu.edu.cn) | 2012年 / Science Press卷 / 35期
关键词
Hash functions;
D O I
10.3724/SP.J.1016.2012.00673
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [41] An ID-Based Anonymous Signcryption Scheme for Multiple Receivers Secure in the Standard Model
    Zhang, Bo
    Xu, Qiuliang
    ADVANCES IN COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, PROCEEDINGS, 2010, 6059 : 15 - 27
  • [42] Analysis of an ID-based Proxy Signature Scheme Without Trusted PKG and a Proxy Blind Multi-signature Scheme
    Sha, Limin
    2014 15TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD), 2014, : 167 - 170
  • [43] An ID-based multi-signature scheme
    Meng, Tao
    Zhang, Xinping
    Sun, Shenghe
    2007 THIRD INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, VOL II, PROCEEDINGS, 2007, : 115 - 117
  • [44] ID-based Signcryption KEM to Multiple Recipients
    Sun Yinxia
    Li Hui
    CHINESE JOURNAL OF ELECTRONICS, 2011, 20 (02): : 317 - 322
  • [45] Efficient ID-based proxy signature and proxy signcryption form bilinear pairings
    Wang, Q
    Cao, ZF
    COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 167 - 172
  • [46] Secure and efficient multi-message and multi-receiver ID-based signcryption for rekeying in ad hoc networks
    邱婧
    BAI Jun
    SONG Xin-chuan
    HOU Su-mei
    Journal of Chongqing University(English Edition), 2013, 12 (02) : 91 - 96
  • [47] Efficient ID-Based Proxy Blind Signature Scheme
    ZHANG Qing1
    2. School of Computer
    WuhanUniversityJournalofNaturalSciences, 2007, (01) : 105 - 108
  • [48] Efficient ID-based Threshold Ring Signature scheme
    Jiang Han
    Xu QiuLiang
    Chen Guohua
    EUC 2008: PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING, VOL 2, WORKSHOPS, 2008, : 437 - 442
  • [49] An efficient ID-based partially blind signature scheme
    Hu, Xiaoming
    Huang, Shangteng
    SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 3, PROCEEDINGS, 2007, : 291 - +
  • [50] An Efficient ID-based Proxy Ring Signature Scheme
    Wu Lei
    Li Daxing
    2009 WRI INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND MOBILE COMPUTING: CMC 2009, VOL 3, 2009, : 560 - +