Completely Anonymous Multi-Recipient Signcryption Scheme with Public Verification
暂无分享,去创建一个
Lu Gao | Liaojun Pang | Yumin Wang | Huixian Li | Yumin Wang | Liaojun Pang | Huixian Li | Lu Gao
[1] Bo Zhang,et al. An ID-Based Anonymous Signcryption Scheme for Multiple Receivers Secure in the Standard Model , 2010, AST/UCMA/ISA/ACN.
[2] Yuliang Zheng,et al. Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption) , 1997, CRYPTO.
[3] C. Pandu Rangan,et al. An Efficient Identity-Based Signcryption Scheme for Multiple Receivers , 2009, IWSEC.
[4] Jianhong Zhang,et al. A Novel ID-Based Anonymous Signcryption Scheme , 2009, APWeb/WAIM.
[5] Yi Mu,et al. Identity-based ring signcryption schemes: cryptographic primitives for preserving privacy and authenticity in the ubiquitous world , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).
[6] Joonsang Baek,et al. Efficient Multi-receiver Identity-Based Encryption and Its Application to Broadcast Encryption , 2005, Public Key Cryptography.
[7] Einar Snekkenes,et al. Robustness of Biometric Gait Authentication Against Impersonation Attack , 2006, OTM Workshops.
[8] Huawang Qin,et al. Identity-based multi-receiver threshold signcryption scheme , 2011, Secur. Commun. Networks.
[9] Pang Liao. A New Multi-Receiver ID-Based Anonymous Signcryption , 2011 .
[10] Chun-I Fan,et al. Anonymous Multireceiver Identity-Based Encryption , 2010, IEEE Transactions on Computers.
[11] Licheng Jiao,et al. Design and Analysis of a Provable Secure Multi-Recipient Public Key Encryption Scheme: Design and Analysis of a Provable Secure Multi-Recipient Public Key Encryption Scheme , 2009 .
[12] Liaojun Pang,et al. Improved multicast key management of Chinese wireless local area network security standard , 2012, IET Commun..
[13] Xiaohui Wang,et al. Efficient ID-based Secure Encryption Scheme for Anonymous Receivers , 2009, J. Networks.
[14] Yasmine Abouelseoud,et al. MIDSCYK: An efficient provably secure multi-recipient identity-based signcryption scheme , 2009, 2009 International Conference on Networking and Media Convergence.
[15] Yael Tauman Kalai,et al. How to Leak a Secret: Theory and Applications of Ring Signatures , 2006, Essays in Memory of Shimon Even.
[16] Jiao Licheng,et al. Design and Analysis of a Provable Secure Multi-Recipient Public Key Encryption Scheme , 2009 .
[17] Sunder Lal,et al. Anonymous ID Based Signcryption Scheme for Multiple Receivers , 2009, IACR Cryptol. ePrint Arch..
[18] Zhenfu Cao,et al. Efficient and Provably Secure Multi-receiver Identity-Based Signcryption , 2006, ACISP.
[19] John Malone-Lee,et al. Identity-Based Signcryption , 2002, IACR Cryptol. ePrint Arch..
[20] Xie Qi,et al. A new (t, n) threshold signature scheme withstanding the conspiracy attack , 2008, Wuhan University Journal of Natural Sciences.