共 50 条
- [21] Identity-based proxy signcryption schemes INFORMATION SCIENCE AND MANAGEMENT ENGINEERING, VOLS 1-3, 2014, 46 : 1237 - 1242
- [23] Anonymous identity-based broadcast encryption technology for smart city information system Personal and Ubiquitous Computing, 2017, 21 : 841 - 853
- [24] Leakage-Resilient Anonymous Identity-Based Broadcast Encryption in the Standard Model ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2015, 2015, 9532 : 201 - 210
- [25] Anonymous Identity-Based Broadcast Encryption with Constant Decryption Complexity and Strong Security ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 223 - 233
- [26] Multipurpose identity-based signcryption - A swiss army knife for identity-based cryptography ADVANCES IN CRYPTOLOGY-CRYPTO 2003, PROCEEDINGS, 2003, 2729 : 383 - 399
- [28] Leakage resilient identity-based aggregate signcryption Beijing Youdian Daxue Xuebao, 1600, 5 (20-25):
- [29] Identity-based signcryption without random oracles SECRYPT 2008: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2008, : 342 - 347
- [30] Cryptanalysis of two identity-based signcryption schemes 2011 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), VOLS 1-4, 2012, : 694 - 698