Computer Science ›› 2015, Vol. 42 ›› Issue (5): 165-168.doi: 10.11896/j.issn.1002-137X.2015.05.033
Previous Articles Next Articles
ZHANG Xue, JI Hui-fang, LI Guang-song and HAN Wen-bao
[1] Adi S.Identity-based cryptosystems and signature schemes [C]∥Advances in Crypto’84.Springer-Verlag,1984:47-53 [2] Dan B,Matt F.Identity based encryption from the Weil paring [C]∥Advances in Crypto’01.Springer-Verlag,2001:213-229 [3] Zheng Yu-liang.Digital Signcryption or How to Achieve Cost(Signature & Encryption)< [5] Hess Florian.Efficient identity based signature scheme based on Parings[C]∥Proceeding of the 9th Workshop on Selective Areas on Cryptography (SAC 2002).Springer-Verlag,2002,2595 [6] 路晓明,冯登国.一种基于身份的多信任域网格认证模型[J].电子学报,2006,34(4):577-581 [7] Li Fa-gen,HuYu-pu,Zhang Chuan-rong.An identity based signcryption scheme for multi-domain Ad Hoc Networks[C]∥Proceeding of ACNS 2007.2007,4521:373-384 [8] Sunder L,Prashant K.Multi-PKG based signcryption [R].Cryptology ePrint Archive,Report 2008/050 [9] 张红旗,张文波,等.网格环境下基于身份的跨域认证研究[J].计算机工程,2009,35(17):160-162 [10] 朱重,吴国新.分布式多信域管理技术研究综述[J].计算机科学,2011,38(4):38-92 |
No related articles found! |
|