An efficient certificate-based designated verifier signature scheme

被引:0
|
作者
机构
[1] Li, Jiguo
[2] Qian, Na
[3] Zhang, Yichen
[4] Huang, Xinyi
来源
| 1600年 / Slovak Academy of Sciences卷 / 35期
关键词
43;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [1] AN EFFICIENT CERTIFICATE-BASED DESIGNATED VERIFIER SIGNATURE SCHEME
    Li, Jiguo
    Qian, Na
    Zhang, Yichen
    Huang, Xinyi
    COMPUTING AND INFORMATICS, 2016, 35 (05) : 1210 - 1230
  • [2] Efficient Certificate-Based Signature Scheme
    Ming, Yang
    Wang, Yumin
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 87 - +
  • [3] A New Efficient Certificate-Based Signature Scheme
    Zhang Yichen
    Li Jiguo
    Wang Zhiwei
    Yao Wei
    CHINESE JOURNAL OF ELECTRONICS, 2015, 24 (04) : 776 - 782
  • [4] An efficient short certificate-based signature scheme
    Li, Jiguo
    Huang, Xinyi
    Zhang, Yichen
    Xu, Lizhong
    JOURNAL OF SYSTEMS AND SOFTWARE, 2012, 85 (02) : 314 - 322
  • [5] A New Efficient Certificate-Based Signature Scheme
    ZHANG Yichen
    LI Jiguo
    WANG Zhiwei
    YAO Wei
    ChineseJournalofElectronics, 2015, 24 (04) : 776 - 782
  • [6] A certificate-based signature scheme
    Kang, BG
    Park, JH
    Hahn, SG
    TOPICS IN CRYPTOLOGY - CT-RSA 2004, PROCEEDINGS, 2004, 2964 : 99 - 111
  • [7] Efficient certificate-based verifiable encrypted signature scheme
    Huang, Rufen
    Nong, Qiang
    INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2014, 13 (3-4) : 257 - 267
  • [8] An Efficient Certificate-Based Signature Scheme in the Standard Model
    Wang, Guoqiang
    Cao, Yanmei
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (ACNS 2021), PT I, 2021, 12726 : 313 - 329
  • [9] An Efficient Certificateless Designated Verifier Signature Scheme
    He, Debiao
    Chen, Jianhua
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2013, 10 (04) : 389 - 396
  • [10] An efficient strong designated verifier signature scheme
    Saeednia, S
    Kremer, S
    Markowitch, O
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2003, 2004, 2971 : 40 - 54