Improved publicly verifiable signcryption scheme using hash function

被引:0
|
作者
Zhou, Huihua [1 ,2 ]
Yang, Muxiang [1 ]
Zheng, Minghui [1 ]
Cui, Guohua [1 ]
机构
[1] College of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan 430074, China
[2] Department of Computer Science and Technology, Hubei Institute for Nationalities, Enshi 445000, China
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:1 / 4
相关论文
共 50 条
  • [41] On the Security of Publicly Verifiable Anonymous IBE Scheme in the Standard Model
    Yang Q.-L.
    Zhou Y.-W.
    Yang K.-W.
    Wang T.
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2020, 48 (02): : 291 - 295
  • [42] A PAIRING-BASED PUBLICLY VERIFIABLE SECRET SHARING SCHEME
    Wu, Tsu-Yang
    Tseng, Yuh-Min
    JOURNAL OF SYSTEMS SCIENCE & COMPLEXITY, 2011, 24 (01) : 186 - 194
  • [43] A publicly verifiable PCAE scheme for confidential applications with proxy delegation
    Wu, Tzong-Sun
    Lin, Han-Yu
    Ting, Pei-Yih
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2012, 23 (02): : 172 - 185
  • [44] Non-interactive publicly verifiable electronic voting scheme
    Information Engineering Institute, Information Engineering University, Zhengzhou 450002, China
    Kongzhi yu Juece Control Decis, 2006, 1 (107-110):
  • [45] A Fast Publicly Verifiable Secret Sharing Scheme using Non-homogeneous Linear Recursions
    Zaghian, Ali
    Bagherpour, Bagher
    ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2020, 12 (02): : 91 - 99
  • [46] Threshold signcryption scheme based on elliptic curve cryptosystem and verifiable secret sharing
    Peng, CG
    Li, X
    2005 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING PROCEEDINGS, VOLS 1 AND 2, 2005, : 1136 - 1139
  • [47] A Practical Publicly Verifiable Secret Sharing Scheme Based on Bilinear Pairing
    Tian, Youliang
    Peng, Changgen
    Zhang, Renping
    Chen, Yuling
    2008 2ND INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY AND IDENTIFICATION, 2008, : 71 - 75
  • [48] A publicly verifiable watermarking scheme based on quantum chaos and DWT–DCT
    Gaurav Sharma
    Rashmi Chawla
    Shailender Gupta
    Shirin Dora
    SN Applied Sciences, 2019, 1
  • [49] A new publicly verifiable blind detection scheme for intellectual property protection
    Liang W.
    Long J.
    Chen X.
    Fan Y.
    Xiao W.
    International Journal of System Assurance Engineering and Management, 2017, 8 (Suppl 3) : 2017 - 2029
  • [50] Security analysis of a publicly verifiable data possession scheme for remote storage
    Zhiyan Xu
    Libing Wu
    Debiao He
    Muhammad Khurram Khan
    The Journal of Supercomputing, 2017, 73 : 4923 - 4930