Computer Science ›› 2015, Vol. 42 ›› Issue (3): 106-110.doi: 10.11896/j.issn.1002-137X.2015.03.022
Previous Articles Next Articles
YU Zhi-min, JING Zheng-jun and GU Chun-sheng
[1] Rivest R L,Shamir A,Tauman Y.How to leak a secret[C]∥Advances in Cryptology-ASIACRYPT 2001.Berlin:Springer-Verlag,2001:552-565 [2] Zheng Yu-liang.Digital signcryption or how to achieve cost(signature&encryption)< [4] Huang X Y,Zhang F T,Wu W.Identity-based ring signcryption scheme[J].Tien Tzu Hsueh Pao/Acta Electronica Sinica,2006,4(2):263-266 [5] Selvi S S D,Vivek S S,Rangan C P.On the security of identity based ring signcryption schemes[C]∥Information Security,12th International Conference(ISC 2009).Berlin:Springer-Verlag,2009:310-325 [6] Deng Lun-zhi,Liu Cheng-lian,Wang Xiang-bin.An ImprovedIdentity-Based Ring Signcryption Scheme[J].Information Security Journal:A Global Perspective,2013,22(1):46-54 [7] Sharmila D S S,Sree V S,Pandu R C.Identity based ring signcryption schemes revisited[J].Journal of Math-for-Industry,2011,3(A3):33-46 [8] Zhang Bo,Xu Qiu-liang.An ID-based anonymous signcryptionscheme for multiple receivers secure in the standard model:Advances in Computer Science and Information Technology[C]∥AST/UCMA/ISA/ACN 2010 Conferences.Berlin:Springer-Verlag,2010:15-27 [9] 鲁力,胡磊.基于Weil对的多接收者公钥加密方案[J].软件学报,2008,9(8):2159-2166 [10] 庞辽军,高璐,裴庆祺,等.基于身份公平的匿名多接收者签密方案[J].通信学报,2013,4(8):161-168 [11] 李慧贤,陈绪宝,巨龙飞,等.改进的多接收者签密方案[J].计算机研究与发展,2013,0(7):1418-1425 [12] Shor P W.Polynomial-time algorithms for prime factorizationand discrete logarithms on a quantum computer[J].SIAM J Comput,1997,26(5):1484-1509 [13] Boneh D,Silverberg A.Applications of multilinear forms tocryptography[J].Contemporary Mathematics,2003,324:71-90 [14] Garg S,Gentry C,Halevi S.Candidate multilinear maps fromideal lattices[C]∥Advances in Cryptology(EUROCRYPT 2013).Berlin:Springer-Verlag,2013:1-17 [15] Coron J-S,de Lepoint T,Tibouchi M.Practical multilinear maps over the integers[C]∥Advances in Cryptology(CRYPTO 2013).Berlin:Springer-Verlag,2013:476-493 [16] Hohenberger S,Sahai A,Waters B.Full domain hash from (le-veled) multilinear maps and identity-based aggregate signatures [EB/OL].2013-7.http://eprint.iacr.org/2013/434.pdf |
No related articles found! |
|