共 50 条
- [31] An identity-based ring signcryption scheme in ideal lattice Journal of Network Intelligence, 2018, 3 (03): : 152 - 161
- [32] An Efficient Identity-based Multi-signcryption Scheme PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMPUTER INFORMATION SYSTEMS AND INDUSTRIAL APPLICATIONS (CISIA 2015), 2015, 18 : 308 - 310
- [33] An Efficient Identity-Based Signcryption Scheme for Multiple Receivers ADVANCES IN INFORMATION AND COMPUTER SECURITY, PROCEEDINGS, 2009, 5824 : 71 - +
- [34] Efficient identity-based signcryption scheme for multiple receivers AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2007, 4610 : 13 - +
- [35] Identity-based Group-recevier Signcryption scheme 2014 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE, ELECTRONICS AND ELECTRICAL ENGINEERING (ISEEE), VOLS 1-3, 2014, : 1986 - +
- [36] A Fuzzy Identity-Based Signcryption Scheme from Lattices KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2014, 8 (11): : 4203 - 4225
- [37] Cryptanalysis of Barni et al. watermarking scheme PROGRESS IN CRYPTOLOGY - INDOCRYPT 2005, PROCEEDINGS, 2005, 3797 : 197 - 208
- [38] Identity based threshold proxy signcryption scheme FIFTH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY - PROCEEDINGS, 2005, : 695 - 699
- [40] Cryptanalysis of Yeh et al.'s timestamp based scheme using smart card PROCEEDINGS OF 2016 INTERNATIONAL CONFERENCE ON APPLIED SYSTEM INNOVATION (ICASI), 2016,