共 50 条
- [21] Insecurity of an Efficient Identity-Based Proxy Signature in the Standard Model COMPUTER JOURNAL, 2015, 58 (10): : 2507 - 2508
- [23] PRACTICAL HIERARCHICAL IDENTITY BASED SIGNATURE IN THE STANDARD MODEL 2008 INTERNATIONAL CONFERENCE ON NEURAL NETWORKS AND SIGNAL PROCESSING, VOLS 1 AND 2, 2007, : 416 - 421
- [24] Adaptively secure hierarchical identity-based encryption in the standard model ICIC Express Letters, 2011, 5 (4 B): : 1321 - 1326
- [25] Hierarchical Identity-Based Signature in Polynomial Rings COMPUTER JOURNAL, 2020, 63 (10): : 1490 - 1499
- [27] An Identity-Based Proxy Signature Scheme from Lattices in the Standard Model 2016 8TH INTERNATIONAL CONFERENCE ON INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS (INCOS), 2016, : 167 - 172
- [29] Identity-based Convertible Limited Verifier Signature Scheme in the Standard Model MEASURING TECHNOLOGY AND MECHATRONICS AUTOMATION, PTS 1 AND 2, 2011, 48-49 : 599 - +
- [30] Identity-based signature scheme with partial message recovery in the standard model Beijing Gongye Daxue Xuebao/Journal of Beijing University of Technology, 2010, 36 (05): : 654 - 658