共 50 条
- [31] AN EFFICIENT IDENTITY-BASED RING SIGNCRYPTION SCHEME WITHOUT RANDOM ORACLES FOURTH INTERNATIONAL CONFERENCE ON COMPUTER AND ELECTRICAL ENGINEERING (ICCEE 2011), 2011, : 673 - +
- [32] Fully anonymous identity-based broadcast encryption without random oracles Ren, Y. (ryl1982@shu.edu.cn), 1600, Femto Technique Co., Ltd. (16):
- [33] Identity-Based Encryption Resilient to Continual Leakage Without Random Oracles FRONTIERS IN CYBER SECURITY, FCS 2019, 2019, 1105 : 53 - 64
- [35] Mutative identity-based signatures or dynamic credentials without random oracles CRYPTOLOGY AND NETWORK SECURITY, 2007, 4856 : 1 - +
- [36] New Constructions of Identity-based Broadcast Encryption without Random Oracles KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2011, 5 (02): : 428 - 439
- [38] Identity-based key-insulated signature without random oracles COMPUTATIONAL INTELLIGENCE AND SECURITY, 2007, 4456 : 470 - +
- [39] Identity-based proxy re-encryption without random oracles INFORMATION SECURITY, PROCEEDINGS, 2007, 4779 : 189 - +
- [40] Identity-based key-insulated signature without random oracles 2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS, 2006, : 1253 - 1258