Identity-based authenticated blind signature scheme

被引:0
作者
Department of Computer Science and Technology, Shanghai University of Electric Power, Shanghai 20009, China [1 ]
不详 [2 ]
机构
来源
Jisuanji Gongcheng | 2006年 / 14卷 / 136-137期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
[21]   A Practical Identity-Based Signature Scheme [J].
LI Chenghua ZHU Jianxin WU Junjun ZHANG Xinfang DENG Qian School of Mechanical Science and Engineering Huazhong University of Science and Technology Wuhan Hubei China Department of Mechanical and Aerospace Engineering University of Florida Gainesville Florida USA .
WuhanUniversityJournalofNaturalSciences, 2008, (06) :692-696
[22]   Biometric identity-based signature scheme [J].
Hou, Hongxia ;
Wang, Shangping ;
Ma, Xiaojing ;
Dai, Rendong .
Jisuanji Gongcheng/Computer Engineering, 2006, 32 (15) :149-151
[23]   Identity-based puncturable signature scheme [J].
Yang D. ;
Chen Y. ;
Wei J. ;
Hu X. .
Tongxin Xuebao/Journal on Communications, 2021, 42 (12) :17-26
[24]   Identity-Based Secret Signature Scheme [J].
Lee, Byoungcheon ;
Li, Jin ;
Kim, Kwangjo .
ICCIT: 2009 FOURTH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND CONVERGENCE INFORMATION TECHNOLOGY, VOLS 1 AND 2, 2009, :1080-+
[25]   On the security of an identity-based signature scheme [J].
Huang, X.-Y. (xyhuang81@gmail.com), 1600, Science Press (37) :1025-1029
[26]   An Efficient Identity-Based Deniable Authenticated Encryption Scheme [J].
Wu, Weifeng ;
Li, Fagen .
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2015, 9 (05) :1904-1919
[27]   Efficient identity-based blind message recovery signature scheme from pairings [J].
Verma, Girraj Kumar ;
Singh, B. B. .
IET INFORMATION SECURITY, 2018, 12 (02) :150-156
[28]   A novel and provably secure identity-based blind signature scheme for online transactions [J].
Kumar, Sunil ;
Mittal, Gaurav ;
Yadav, Arvind .
SADHANA-ACADEMY PROCEEDINGS IN ENGINEERING SCIENCES, 2025, 50 (02)
[29]   Efficient identity-based ring identification scheme and identity-based ring signature scheme on lattices [J].
Hu X. ;
Jia H. ;
Liu J. ;
Zhao Z. .
Int. J. Secur. Netw., 2023, 4 (213-226) :213-226
[30]   A Lattice-Based Identity-Based Proxy Blind Signature Scheme in the Standard Model [J].
Zhang, Lili ;
Ma, Yanqin .
MATHEMATICAL PROBLEMS IN ENGINEERING, 2014, 2014