共 50 条
- [2] Comparing Performance of Hierarchical Identity-Based Signature Schemes IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2016, E99D (12): : 3181 - 3184
- [3] Adaptively secure hierarchical identity-based signature in the standard model Journal of China Universities of Posts and Telecommunications, 2010, 17 (06): : 95 - 100
- [5] Scalable Hierarchical Identity-based Signature Scheme from Lattices KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2013, 7 (12): : 3261 - 3273
- [6] Hierarchical Identity-Based Signature over Verifiable Random Function FRONTIERS IN CYBER SECURITY, FCS 2019, 2019, 1105 : 177 - 189
- [7] New Constructions of Hierarchical Identity-Based Signature in the Standard Model ADVANCED MATERIALS AND COMPUTER SCIENCE, PTS 1-3, 2011, 474-476 : 1356 - 1361
- [8] Identity-based encryption and hierarchical identity-based encryption Cryptology Inf. Secur. Ser., 2009, (45-64):
- [9] A New Construction of Short Hierarchical Identity-based Signature in the Standard Model INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (04): : 180 - 186