共 50 条
[32]
On security of a certificateless signcryption scheme
[J].
INFORMATION SCIENCES,
2013, 232
:475-481
[33]
Threshold Attribute-based Signcryption with Constant-Size Ciphertexts and Public Verifiability
[J].
2013 32ND CHINESE CONTROL CONFERENCE (CCC),
2013,
:6373-6377
[34]
Efficient Public Verifiability and Data Dynamics for Storage Security in Hybrid Clouds
[J].
2013 4TH IEEE INTERNATIONAL CONFERENCE ON COMPUTER & COMMUNICATION TECHNOLOGY (ICCCT),
2013,
:28-33
[36]
Efficient distributed signcryption scheme as group signcryption
[J].
APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS,
2003, 2846
:403-417
[37]
Multi-receiver Identity-Based Signcryption Scheme in the Standard Model
[J].
INFORMATION COMPUTING AND APPLICATIONS,
2011, 7030
:487-+
[38]
Identity-based multi-signcryption scheme without random oracles
[J].
Jisuanji Xuebao/Chinese Journal of Computers,
2010, 33 (01)
:103-110
[39]
An Efficient Lattice-Based Encrypted Search Scheme with Forward Security
[J].
NETWORK AND SYSTEM SECURITY, NSS 2022,
2022, 13787
:712-726
[40]
An Efficient Identity-based Signcryption from Lattice
[J].
INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS,
2014, 8 (02)
:363-374