共 50 条
- [32] Two ID-based authenticated schemes with key agreement for mobile environments The Journal of Supercomputing, 2013, 66 : 973 - 988
- [33] Security analysis and improvement for key issuing schemes in ID-based cryptography TRUST, PRIVACY, AND SECURITY IN DIGITAL BUSINESS, PROCEEDINGS, 2006, 4083 : 203 - 212
- [34] On the Linkability of Two Schnorr Type ID-based Blind Signature Schemes 2009 INTERNATIONAL FORUM ON COMPUTER SCIENCE-TECHNOLOGY AND APPLICATIONS, VOL 2, PROCEEDINGS, 2009, : 265 - 269
- [35] Efficient ID-based Proxy Blind Signature Schemes from Pairings 2008 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, VOLS 1 AND 2, PROCEEDINGS, 2008, : 390 - 393
- [38] Direct chosen-ciphertext secure hierarchical ID-Based encryption schemes PUBLIC KEY INFRASTRUCTURE, PROCEEDINGS, 2007, 4582 : 94 - +
- [39] Modified ID-based threshold decryption and its application to mediated ID-based encryption FRONTIERS OF WWW RESEARCH AND DEVELOPMENT - APWEB 2006, PROCEEDINGS, 2006, 3841 : 720 - 725