Identity-based key-insulated signcryption scheme

被引:0
|
作者
Wang, Huige [1 ,2 ]
Cao, Hao [2 ]
Li, Desheng [2 ]
机构
[1] Dept. of Computer Science and Engineering Shanghai Jiaotong University, Shanghai 200030, China
[2] College of Science Anhui Science and Technology University, Fengyang 233100, China
来源
Journal of Computational Information Systems | 2013年 / 9卷 / 08期
关键词
16;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:3067 / 3075
相关论文
共 50 条
  • [1] Identity-Based Key-Insulated Signcryption
    Chen, Jianhong
    Chen, Kefei
    Wang, Yongtao
    Li, Xiangxue
    Long, Yu
    Wan, Zhongmei
    INFORMATICA, 2012, 23 (01) : 27 - 45
  • [2] An Improvement of an Identity-Based Key-insulated Signcryption
    Zhu, Guobin
    Xiong, Hu
    Wang, Ruijin
    Qin, Zhiguang
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (CSAIT 2013), 2014, 255 : 97 - 104
  • [3] IDENTITY-BASED KEY-INSULATED PROXY SIGNATURE
    Wan Zhongmei Lai Xuejia Weng Jian Liu Shengli Hong Xuan (Department of Computer Science and Engineering
    Journal of Electronics(China), 2009, 26 (06) : 853 - 858
  • [4] A NOVEL IDENTITY-BASED KEY-INSULATED CONVERTIBLE AUTHENTICATED ENCRYPTION SCHEME
    Lin, Han-Yu
    Hsu, Chien-Lung
    INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2011, 22 (03) : 739 - 756
  • [5] Key-Insulated Signcryption
    Fan, Jia
    Zheng, Yuliang
    Tang, Xiaohu
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2013, 19 (10) : 1351 - 1374
  • [6] New identity-based key-insulated convertible multi-authenticated encryption scheme
    Hsu, Chien-Lung
    Lin, Han-Yu
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2011, 34 (05) : 1724 - 1731
  • [7] Fully Secure Identity Based Key-Insulated Signcryption in the Standard Model
    Zhu, Guobin
    Xiong, Hu
    Qin, Zhiguang
    WIRELESS PERSONAL COMMUNICATIONS, 2014, 79 (02) : 1401 - 1416
  • [8] Efficient and Secure Identity-based Strong Key-Insulated Signature Scheme without Pairings
    Reddy, P. Vasudeva
    Babu, A. Ramesh
    Gayathri, N. B.
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2021, 33 (10) : 1211 - 1218
  • [9] Fully Secure Identity Based Key-Insulated Signcryption in the Standard Model
    Guobin Zhu
    Hu Xiong
    Zhiguang Qin
    Wireless Personal Communications, 2014, 79 : 1401 - 1416
  • [10] Identity-based key-insulated signature with secure key-updates
    Weng, Jian
    Liu, Shengli
    Chen, Kefei
    Li, Xiangxue
    INFORMATION SECURITY AND CRYPTOLOGY, PROCEEDINGS, 2006, 4318 : 13 - +