Certificateless Ring Signcryption Scheme from Pairings
暂无分享,去创建一个
Hui Guo | Lunzhi Deng | Hui Guo | Lunzhi Deng
[1] Yuqing Zhang,et al. An efficient and provable secure identity-based ring signcryption scheme , 2009, Comput. Stand. Interfaces.
[2] Jian Shen,et al. Efficient certificateless anonymous multi-receiver encryption scheme for mobile devices , 2017, Soft Comput..
[3] Tzu-Chun Lin,et al. Cryptanalysis of an ID-based Deniable Threshold Ring Authentication , 2019, Int. J. Netw. Secur..
[4] Tao Feng,et al. A Sensitive Information Protection Scheme in Named Data Networking Using Attribute-Based Ring-Signcryption , 2017, 2017 IEEE Second International Conference on Data Science in Cyberspace (DSC).
[5] Min-Shiang Hwang,et al. An improvement of an efficient user identification scheme based on ID-based cryptosystem , 2004, IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC'06).
[6] A. Arul Jothi and Dr. B. Srinivasan. Security Analysis in Body Area Networks using Attribute-based Ring Signcryption Scheme , 2016 .
[7] Chin-Chen Chang,et al. Parallel computation of the generating keys for RSA cryptosystems , 1996 .
[8] José Luis Salazar,et al. Efficient ways of prime number generation for ring signatures , 2016, IET Inf. Secur..
[9] Thomas Plantard,et al. Logarithmic size ring signatures without random oracles , 2016, IET Inf. Secur..
[10] Yael Tauman Kalai,et al. How to Leak a Secret: Theory and Applications of Ring Signatures , 2001, Essays in Memory of Shimon Even.
[11] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[12] Yunlei Zhao,et al. Practical Constant-Size Ring Signature , 2018, Journal of Computer Science and Technology.
[13] Lunzhi Deng,et al. Identity-based threshold ring signcryption from pairing , 2014, Int. J. Electron. Secur. Digit. Forensics.
[14] Ji Geng,et al. Cryptanalysis of Attribute-based Ring Signcryption Scheme , 2015, Int. J. Netw. Secur..
[15] Addepalli V. N. Krishna,et al. Window Method Based Cubic Spline Curve Public Key Cryptography , 2016 .
[16] Chenglian Liu,et al. An Improved Identity-Based Ring Signcryption Scheme , 2013, Inf. Secur. J. A Glob. Perspect..
[17] Jian Shen,et al. Insecurity of a Pairing-Free Certificateless Ring Signcryption Scheme , 2017, Wirel. Pers. Commun..
[18] Yi Mu,et al. Identity-based ring signcryption schemes: cryptographic primitives for preserving privacy and authenticity in the ubiquitous world , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).
[19] Kenneth G. Paterson,et al. Certificateless Public Key Cryptography , 2003 .
[20] Chunguang Ma,et al. A Secure Ring Signcryption Scheme for Private and Anonymous Communication , 2007, 2007 IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007).
[21] Xiaolei Dong,et al. Efficient Ring Signature and Group Signature Schemes Based on q-ary Identification Protocols , 2018, Comput. J..
[22] Lunzhi Deng,et al. Certificateless ring signature based on RSA problem and DL problem , 2015, RAIRO Theor. Informatics Appl..
[23] C. Pandu Rangan,et al. On the Security of Identity Based Ring Signcryption Schemes , 2009, ISC.
[24] Gaurav Sharma,et al. Pairing-Free Certificateless Ring Signcryption (PF-CLRSC) Scheme for Wireless Sensor Networks , 2015, Wirel. Pers. Commun..
[25] Zongmin Cui,et al. Efficient Identity-Based Generalized Ring Signcryption Scheme , 2016, KSII Trans. Internet Inf. Syst..