A biometric identity based signature scheme

被引:0
|
作者
Computer Security and Cryptography Group, Computer Science Department NUI Maynooth, Co. Kildare, Ireland [1 ]
机构
来源
Int. J. Netw. Secur. | 2007年 / 3卷 / 317-326期
关键词
25;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [31] Identity-Based Linkable Ring Signature Scheme
    Deng, Lunzhi
    Jiang, Yuhong
    Ning, Bingqin
    IEEE ACCESS, 2019, 7 : 153969 - 153976
  • [32] A new identity-based group signature scheme
    Cheng, Xiangguo
    Guo, Lifeng
    Yu, Jia
    Ma, Huiran
    Wu, Yuexiu
    International Journal of Computers and Applications, 2013, 35 (01) : 1 - 5
  • [33] RKA Security for Identity-Based Signature Scheme
    Chang, Jinyong
    Wang, Huiqun
    Wang, Fei
    Zhang, Anling
    Ji, Yanyan
    IEEE ACCESS, 2020, 8 : 17833 - 17841
  • [34] Comments on an identity-based signature scheme for VANETs
    Song, Yaqing
    Xu, Chunxiang
    Zhang, Yuan
    Li, Fagen
    JOURNAL OF SYSTEMS ARCHITECTURE, 2021, 112
  • [35] Identity based strong designated verifier signature scheme
    Kancharla, Phani Kumar
    Gummadidala, Shailaja
    INFORMATICA, 2007, 18 (02) : 239 - 252
  • [36] Identity oriented signature scheme based on quadratic residues
    Qiu, WD
    Chen, KF
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 168 (01) : 235 - 242
  • [37] A provable secure fuzzy identity based signature scheme
    WANG ChangJi 1
    2 Guangdong Province Information Security Key Laboratory
    ScienceChina(InformationSciences), 2012, 55 (09) : 2139 - 2148
  • [38] Identity-based authenticated blind signature scheme
    Department of Computer Science and Technology, Shanghai University of Electric Power, Shanghai 20009, China
    不详
    Jisuanji Gongcheng, 2006, 14 (136-137):
  • [39] An identity-based signature scheme for mobile business
    Wang, Maocai
    Hu, Hanping
    Dai, Guangming
    ICIC Express Letters, 2010, 4 (02): : 565 - 569
  • [40] A new blind identity-based signature scheme
    Elkamchouchi, Hassan
    Abouelseoud, Yasmine
    2007 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING & SYSTEMS: ICCES '07, 2007, : 114 - 119