Biometric identity-based signature scheme

被引:0
|
作者
Hou, Hongxia
Wang, Shangping
Ma, Xiaojing
Dai, Rendong
机构
[1] Research Department of Cipher Code and Network Security, Xi'an University of Science and Technology, Xi'an 710048, China
[2] Department of Information and Control, Xi'an Institute of Post and Telecommunications, Xi'an 710061, China
来源
Jisuanji Gongcheng/Computer Engineering | 2006年 / 32卷 / 15期
关键词
9;
D O I
10.1631/jzus.2006.A0149
中图分类号
学科分类号
摘要
引用
收藏
页码:149 / 151
相关论文
共 50 条
  • [11] Identity-based authenticated blind signature scheme
    Department of Computer Science and Technology, Shanghai University of Electric Power, Shanghai 20009, China
    不详
    Jisuanji Gongcheng, 2006, 14 (136-137):
  • [12] Identity-Based Linkable Ring Signature Scheme
    Deng, Lunzhi
    Jiang, Yuhong
    Ning, Bingqin
    IEEE ACCESS, 2019, 7 : 153969 - 153976
  • [13] A new identity-based group signature scheme
    Cheng, Xiangguo
    Guo, Lifeng
    Yu, Jia
    Ma, Huiran
    Wu, Yuexiu
    International Journal of Computers and Applications, 2013, 35 (01) : 1 - 5
  • [14] RKA Security for Identity-Based Signature Scheme
    Chang, Jinyong
    Wang, Huiqun
    Wang, Fei
    Zhang, Anling
    Ji, Yanyan
    IEEE ACCESS, 2020, 8 : 17833 - 17841
  • [15] An identity-based signature scheme for mobile business
    Wang, Maocai
    Hu, Hanping
    Dai, Guangming
    ICIC Express Letters, 2010, 4 (02): : 565 - 569
  • [16] Comments on an identity-based signature scheme for VANETs
    Song, Yaqing
    Xu, Chunxiang
    Zhang, Yuan
    Li, Fagen
    JOURNAL OF SYSTEMS ARCHITECTURE, 2021, 112
  • [17] A new blind identity-based signature scheme
    Elkamchouchi, Hassan
    Abouelseoud, Yasmine
    2007 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING & SYSTEMS: ICCES '07, 2007, : 114 - 119
  • [18] A new blind identity-based signature scheme
    Elkamchouchi, Hassan
    Abouelseoud, Yasmine
    2008 5TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-3, 2008, : 1102 - 1106
  • [19] IDENTITY-BASED XTR BLIND SIGNATURE SCHEME
    Tang, Qiaoying
    Shen, Fengxian
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2013, 19 (02): : 143 - 149
  • [20] On the Security of an Identity-Based Aggregate Signature Scheme
    Yap, Wun-She
    Heng, Swee-Huay
    Goi, Bok-Min
    2008 22ND INTERNATIONAL WORKSHOPS ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOLS 1-3, 2008, : 1523 - +