ID-based group signature

被引:0
|
作者
Electronics and Telecommunications, Research Inst, Taejon, Korea, Republic of [1 ]
机构
来源
Electron Lett | / 19卷 / 1616-1617期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [31] ID-based, Proxy, Threshold Signature Scheme
    Pomykala, Jacek
    Kulakowski, Henryk
    Sapiecha, Piotr
    Grela, Blazej
    INTERNATIONAL JOURNAL OF ELECTRONICS AND TELECOMMUNICATIONS, 2021, 67 (02) : 201 - 205
  • [32] ID-based, blind signature and ring signature from pairings
    Zhang, FG
    Kim, K
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2002, PROCEEDINGS, 2002, 2501 : 533 - 547
  • [33] ID-Based Deniable Ring Signature with Constant-Size Signature
    Hu, Chengyu
    Liu, Pengtao
    ADVANCES IN CIVIL ENGINEERING, PTS 1-6, 2011, 255-260 : 2192 - +
  • [34] Leakage-resilient ID-based signature scheme in the generic bilinear group model
    Wu, Jui-Di
    Tseng, Yuh-Min
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (17) : 3987 - 4001
  • [35] Known Signature Attack of ID-based Multisignature Schemes
    Yang, Wu-Chuan
    Jhou, Jhih-Syue
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 341 - +
  • [36] ID-based proxy signature scheme with message recovery
    Singh, Harendra
    Verma, Girraj Kumar
    JOURNAL OF SYSTEMS AND SOFTWARE, 2012, 85 (01) : 209 - 214
  • [37] A novel ID-based designated verifier signature scheme
    Zhang, Jianhong
    Mao, Jane
    INFORMATION SCIENCES, 2008, 178 (03) : 766 - 773
  • [39] Provable security of ID-based proxy signature schemes
    Gu, CX
    Zhu, YF
    NETWORKING AND MOBILE COMPUTING, PROCEEDINGS, 2005, 3619 : 1277 - 1286
  • [40] Leakage-free ID-Based Signature, Revisited
    Lin, Xi-Jun
    Sun, Lin
    Qu, Haipeng
    COMPUTER JOURNAL, 2020, 63 (08): : 1263 - 1270