Computer Science ›› 2016, Vol. 43 ›› Issue (11): 221-225.doi: 10.11896/j.issn.1002-137X.2016.11.043
Previous Articles Next Articles
JIANG Di and HAN Yi-liang
[1] Zheng Y.Digital signcryption or How to Achieve Cost(Signa-ture Encryption)<=Cost(Signature)+Cost(Signature)+Cost(Encryption)[C]∥Proceeding of CRYPTO’97,LNCS 1294.Berlin:Springer-Verlag,1997:165-179 [2] Even S,Goldreich O,Micali S.Online/Offline digital signatures[C]∥Proc.CRYPTO 89,LNCS 2442,1989:263-277 [3] Chow S S M,Liu J K,Zhou J Y.Identity-based online/offline key encapsulation and encryption[C]∥Proc of ASIACCS’11.HongKong,China,2011:52-60 [4] Goyal V,Pandey O,Sahai A,et al.Attribute-based encryptionfor fine-grained access control of encrypted data[C]∥Procee-dings of the 13th ACM Conference on Computer and Communications Security.Alexandria,VA,USA,2006:221-238 [5] Maji H K,Prabhakaren M,Rosulek M.Attribute-based signatures:achieving attribute-privacy and collusion- resistance[R].IACR Cryptology ePrint Archive,Report,2008/328,2008 [6] Maji H K,Prabhakaren M,Rosulek M.Attribute-based signatures[J].Lecture Notes in Computer Science,2011,8:376-392 [7] Hohenberger S,Waters B.Online/Offline attribute-based En-cryption[M]∥Public Key Cryptography.Buenos Aires:Sprin-ger,2014:293-310 [8] Gagne′ M,Narayan S,Safavi-Naini R.Threshold attribute-based signcryption [C]∥SCN 2010,LNCS 6280.2010:154-171 [9] Emura K,Atsuko M,Mohammad S.Dynamic attribute basedsigncryption without random oracles [J].International Journal of Applied Cryptography,2012,2(3):199-211 [10] Li J,Man H A.Attribute-based signature and its applications[C]∥Proceedings of the 5th ACM Symposium on Information,Computer and Communications Security.Beijing,China,2010:60-69 [11] Zhang Guo-ying,Fu Xiao-jing,Ma Chun-guang.A Dynamic Thre-shold Attributes-based Signcryption Scheme[J].Journal of Electronics & Information Technology,2012,34(11):2680-2686(in Chinese) 张国印,付小晶,马春光.一个动态门限的基于属性签密方案[J].电子与信息学报,2012,34(11):2680-2686 |
No related articles found! |
|