共 50 条
- [42] Identity-based authenticated blind signature protocol Shanghai Jiaotong Daxue Xuebao, 2006, 7 (1170-1173):
- [43] Identity-based intrusion-resilient signature 2007 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLS 1 AND 2: VOL 1: COMMUNICATION THEORY AND SYSTEMS; VOL 2: SIGNAL PROCESSING, COMPUTATIONAL INTELLIGENCE, CIRCUITS AND SYSTEMS, 2007, : 442 - 446
- [44] An identity-based signature scheme for mobile business ICIC Express Letters, 2010, 4 (02): : 565 - 569
- [45] Efficient identity-based ring identification scheme and identity-based ring signature scheme on lattices Int. J. Secur. Netw., 2023, 4 (213-226): : 213 - 226
- [47] Identity-based proxy signature from pairings AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2007, 4610 : 22 - +
- [48] Embedding an Identity-Based Short Signature as a DigitalWatermark FUTURE INTERNET, 2015, 7 (04): : 393 - 404
- [49] A new blind identity-based signature scheme 2007 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING & SYSTEMS: ICCES '07, 2007, : 114 - 119
- [50] A new blind identity-based signature scheme 2008 5TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-3, 2008, : 1102 - 1106