共 50 条
- [42] Efficient ID-based Threshold Ring Signature scheme EUC 2008: PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING, VOL 2, WORKSHOPS, 2008, : 437 - 442
- [43] An efficient ID-based partially blind signature scheme SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 3, PROCEEDINGS, 2007, : 291 - +
- [46] A Secure ID-based Verifiably Encrypted Signature Scheme PROCEEDINGS OF THE 14TH YOUTH CONFERENCE ON COMMUNICATION, 2009, : 471 - +
- [47] ID-based signature scheme without trusted PKG INFORMATION SECURITY AND CRYPTOLOGY, PROCEEDINGS, 2005, 3822 : 53 - 62
- [48] Efficient ID-based (restrictive) partially blind signature Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2008, 31 (04): : 53 - 57
- [49] An Efficient ID-based Proxy Ring Signature Scheme 2009 WRI INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND MOBILE COMPUTING: CMC 2009, VOL 3, 2009, : 560 - +
- [50] ID-based proxy signature using bilinear pairings PARALLEL AND DISTRIBUTED PROCESSING AND APPLICATIONS - ISPA 2005 WORKSHOPS, 2005, 3759 : 359 - 367