共 50 条
- [42] The Analysis of an Efficient and Provably Secure ID-Based Threshold Signcryption Scheme and Its Secure Version PROVABLE SECURITY, 2008, 5324 : 210 - +
- [43] Threshold signcryption scheme based on elliptic curve cryptosystem and verifiable secret sharing 2005 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING PROCEEDINGS, VOLS 1 AND 2, 2005, : 1136 - 1139
- [44] Efficient ID-Based Ring Signature and Ring Signcryption Schemes 2008 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, VOLS 1 AND 2, PROCEEDINGS, 2008, : 866 - 870
- [45] Privacy Preservation and Drone Authentication Using ID-Based Signcryption NEW TRENDS IN INTELLIGENT SOFTWARE METHODOLOGIES, TOOLS AND TECHNIQUES (SOMET_18), 2018, 303 : 226 - 239
- [48] A new digital signature scheme on ID-based key-sharing infrastructures INFORMATION SECURITY, PROCEEDINGS, 1999, 1729 : 259 - 270
- [49] Efficient forward and provably secure ID-based signcryption scheme with public verifiability and public ciphertext authenticity INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2003, 2004, 2971 : 352 - 369