共 50 条
- [21] An ID-based hybrid broadcast signcryption scheme with user anonymity Lin, Z.-Q., 2013, Sichuan University (45):
- [22] An Efficient and Provably Secure ID-Based Threshold Signcryption Scheme 2008 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLS 1 AND 2: VOL 1: COMMUNICATION THEORY AND SYSTEM, 2008, : 547 - 551
- [24] Secure delegation-by-warrant ID-based proxy signcryption scheme COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 445 - 450
- [25] Secure ID-based proxy signcryption scheme with designated proxy signcrypter MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 351 - 355
- [26] ID-based threshold proxy signcryption scheme from bilinear pairings Int. J. Secur. Netw., 2008, 3 (206-215):
- [28] An ID-Based Anonymous Signcryption Scheme for Multiple Receivers Secure in the Standard Model ADVANCES IN COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, PROCEEDINGS, 2010, 6059 : 15 - 27
- [29] Efficient electronic auction scheme based on secret sharing and signcryption Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2001, 23 (12):
- [30] A New Multi-Receiver ID-Based Signcryption Scheme for Group Communications 2009 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLUMES I & II: COMMUNICATIONS, NETWORKS AND SIGNAL PROCESSING, VOL I/ELECTRONIC DEVICES, CIRUITS AND SYSTEMS, VOL II, 2009, : 296 - 300