共 50 条
- [31] An Efficient and Provably Secure ID-Based Threshold Signcryption Scheme 2008 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLS 1 AND 2: VOL 1: COMMUNICATION THEORY AND SYSTEM, 2008, : 547 - 551
- [32] An improved anonymous ID-based key issuing protocol ICICIC 2006: FIRST INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING, INFORMATION AND CONTROL, VOL 1, PROCEEDINGS, 2006, : 472 - +
- [33] Unconditionally Anonymous Controllable ID-Based Ring Signatures JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2015, 18 (06): : 849 - 867
- [34] Secure delegation-by-warrant ID-based proxy signcryption scheme COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 445 - 450
- [36] Secure ID-based proxy signcryption scheme with designated proxy signcrypter MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 351 - 355
- [38] ID-based threshold proxy signcryption scheme from bilinear pairings Int. J. Secur. Netw., 2008, 3 (206-215):
- [40] Analysis and improvement of an ID-based authenticated key agreement protocol Tongxin Xuebao/Journal on Communication, 2008, 29 (12): : 16 - 21