Computer Science ›› 2013, Vol. 40 ›› Issue (5): 131-135.
Previous Articles Next Articles
SUN Hua,WANG Ai-min and ZHENG Xue-feng
[1] Shamir A.Identity-based cryptosystems and signature schemes[C]∥Proceedings of Crypto 1984.volume 196of LNCS,1984:47-53 [2] Boneh D,Franklin M.Identity-based encryption from the Weil pairing[C]∥Proceedings of Crypto 2001.volume 2139of LNCS,2001:213-229 [3] Florian Hess.Efficient identity based signature schemes basedon pairings[C]∥Proceedings of SAC 2002.volume 2595of LNCS,2002:310-324 [4] Paterson K G,Schuldt J C N.Efficient identity-based signatures secure in the standard model[C]∥Proceedings of ACISP 2006.volume 4058of LNCS,2006:207-222 [5] Zheng Yu-liang.Digital signcryption or how to achieve cost(signature & encryption)cost(signature)+cost(encryption) [C]∥Advances in Cryptology-Crypto 1997.volume 1294of LNCS,Springer-Verlag,1997:165-179 [6] Duan S S,Cao Z F,Lu R X.Robust id-based threshold signcryption scheme from pairings[C]∥Proceedings of the 3rd International Conference on Information Security.ACM,2004:33-37 [7] Peng C G,Li X.An identity-based threshold signcryption sch-eme with semantic security[C]∥Proceedings of CIS 2005.volume 3802of LNCS,Springer-Verlag,2005:173-179 [8] Li F G,Yu Y.An efficient and provably secure id-based thre-shold signcryption scheme[C]∥Proceedings of ICCCAS 2008.IEEE Press,2008:488-492 [9] Zhu Z C,Zhang Y Q,Wang F J.The analysis of an efficient and provably secure id-based threshold signcryption scheme and its secure version[C]∥Proceedings of the Second International Conference on Provable Security.volume 5324of LNCS,Springer Verlag,2008:210-225 [10] Huang Xin-yi,Susilo W,Mu Yi,et al.Identity-based ring signcryption schemes:cryptographic primitives for preserving privacy and authenticity in the ubiquitous world[C]∥Proceedings of the 19th International Conference on Advanced Information Networking and Application 2005.volume 2,2005:649-654 [11] Zhang M W,Yang B,Zhu S L,et al.Efficient secret authenticata-ble anonymous signcryption scheme with identity privacy[C]∥Proceedings of IEEE ISI 2008.volume 5075of LNCS,Springer-Verlag,2008:126-137 [12] Zhun L J,Zhang F T.Efficient id-based ring signature and ring signcryption schemes[C]∥Proceedings of CIS 2008.IEEE Press,2008:303-307 [13] Zhu Z C,Zhang Y Q,Wang F J.An efficient and provable secure identity-based ring signcryption scheme[J].Computer Standards & Interfaces,2009,31:1092-1097 [14] Sharmila Deva Selvi S,Sree Vivek S,Pandu Rangan C.On the security of identity based ring signcryption schemes [C]∥Proceedings of the 12th International Conference on Information Security.volume 5735of LNCS,Springer-Verlag,2009:310-325 [15] 罗大文,何明星,李虓.基于身份的门限环签密方案[J].计算机工程与应用,2011,47(33):65-67 |
No related articles found! |
|