共 50 条
- [31] An ID-based verifiable encrypted signature scheme based on Hess's scheme INFORMATION SECURITY AND CRYPTOLOGY, PROCEEDINGS, 2005, 3822 : 42 - 52
- [33] A novel ID-based signature scheme from bilinear pairings ICCC2004: PROCEEDINGS OF THE 16TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION VOL 1AND 2, 2004, : 551 - 555
- [34] ID-based ring signature scheme for collaborative design system Zhongguo Kuangye Daxue Xuebao/Journal of China University of Mining and Technology, 2007, 36 (03): : 343 - 346
- [36] An efficient ID-based restrictive partially blind signature scheme SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 3, PROCEEDINGS, 2007, : 205 - +
- [37] A Security Enforcement ID-based Partially Blind Signature Scheme WISM: 2009 INTERNATIONAL CONFERENCE ON WEB INFORMATION SYSTEMS AND MINING, PROCEEDINGS, 2009, : 488 - 492
- [38] Cryptanalysis of an ID-based proxy signature scheme with message recovery APPLIED MATHEMATICS & INFORMATION SCIENCES, 2012, 6 (03): : 419 - 422
- [39] Efficient ID-Based Signature Scheme from Bilinear Map ADVANCES IN PARALLEL, DISTRIBUTED COMPUTING, 2011, 203 : 301 - 306
- [40] ID-based designated multi verifier proxy signature scheme Tongxin Xuebao/Journal on Communication, 2008, 29 (SUPPL.): : 41 - 45