共 53 条
[1]
Araki S(1999)The limited verifier signature and its application IEICE Trans. Fundam. E82–A 63-68
[2]
Uehara S(2008)Selectively convertible authenticated encryption in the random oracle model Comput. J. 51 419-434
[3]
Imamura K(1985)A public key cryptosystem and a signature scheme based on discrete logarithms IEEE Trans. Inf. Theory IT–31 469-472
[4]
Chien HY(1994)Authenticated encryption schemes with low communication costs Electron. Lett. 30 1212-1213
[5]
ElGamal T(2011)New identity-based key-insulated convertible multi-authenticated encryption scheme J. Netw. Comput. Appl. 34 1724-1731
[6]
Horster P(2014)Convertible authenticated encryption scheme with hierarchical access control Appl. Math. Inf. Sci. 8 1239-1246
[7]
Michel M(2009)A new convertible authenticated encryption scheme based on the ElGamal cryptosystem Int. J. Found. Comput. Sci. 20 351-359
[8]
Peterson H(2011)A novel identity-based key-insulated convertible authenticated encryption scheme Int. J. Found. Comput. Sci. 22 739-756
[9]
Hsu CL(2011)Improved convertible authenticated encryption scheme with provable security Inf. Process. Lett. 111 661-666
[10]
Lin HY(2012)An efficient strong designated verifier proxy signature scheme for electronic commerce J. Inf. Sci. Eng. 28 771-785