Computer Science ›› 2006, Vol. 33 ›› Issue (8): 109-112.

Previous Articles     Next Articles

CHEN Shun ,YAO Qian, XIE Li (The National Key Laboratory of New Software Technology, Nanjin University, Nanjin 210008)   

  • Online:2018-11-17 Published:2018-11-17

Abstract: Using the bilinear property of pairing on the elliptic GDH group,a 3- party weak signcryption scheme based on ID is propose& It getts ride of the restriction of PKI system and surpasses the traditional one to one identification model having the securities

Key words: Identification,Online transaction, Electronic payment,Security scheme

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!