共 50 条
- [11] An efficient ID-Based proxy signature scheme from pairings INFORMATION SECURITY AND CRYPTOLOGY, 2008, 4990 : 40 - 50
- [12] An ID-Based Proxy Multi Signature Scheme without Bilinear Pairings SECURITY ASPECTS IN INFORMATION TECHNOLOGY, 2011, 7011 : 83 - 92
- [14] Efficient ID-based Threshold Ring Signature scheme EUC 2008: PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING, VOL 2, WORKSHOPS, 2008, : 437 - 442
- [15] An efficient ID-based partially blind signature scheme SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 3, PROCEEDINGS, 2007, : 291 - +
- [16] An Efficient ID-based Proxy Ring Signature Scheme 2009 WRI INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND MOBILE COMPUTING: CMC 2009, VOL 3, 2009, : 560 - +
- [19] Towards Efficient ID-based Signature Schemes with Batch Verifications from Bilinear Pairings 2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), VOLS 1 AND 2, 2009, : 935 - 940
- [20] An ID-Based Blind Signature from Bilinear Pairing with Unlinkability 2013 3RD INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS, COMMUNICATIONS AND NETWORKS (CECNET), 2013, : 101 - 104