共 50 条
- [41] A Secure Email Encryption Proxy Based on Identity-based Cryptography 2008 INTERNATIONAL CONFERENCE ON MULTIMEDIA AND INFORMATION TECHNOLOGY, PROCEEDINGS, 2008, : 284 - 286
- [42] Secure and efficient identity-based proxy multi-signature using cubic residues Chang, Chin-Chen (alan3c@gmail.com), 1600, Femto Technique Co., Ltd. (18):
- [44] Provably secure RSA-type signature based on conic curve WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2009, 9 (02): : 217 - 225
- [45] Efficient identity-based ring identification scheme and identity-based ring signature scheme on lattices Int. J. Secur. Netw., 2023, 4 (213-226): : 213 - 226
- [46] Provably Secure Identity-Based Threshold Decryption on Access Structure 2014 TENTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2014, : 464 - 468
- [49] Identity-Based Aggregate and Multi-Signature Schemes Based on RSA PUBLIC KEY CRYPTOGRAPHY - PKC 2010, PROCEEDINGS, 2010, 6056 : 480 - 498
- [50] An identity-based proxy signature scheme from pairings INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2006, 4307 : 60 - 71