An efficient multi-recipient signcryption scheme for multi-user communication
暂无分享,去创建一个
[1] Liqun Chen,et al. Improved Identity-Based Signcryption , 2005, Public Key Cryptography.
[2] Hovav Shacham,et al. Short Signatures from the Weil Pairing , 2001, J. Cryptol..
[3] Jean-Jacques Quisquater,et al. Efficient Signcryption with Key Privacy from Gap Diffie-Hellman Groups , 2004, Public Key Cryptography.
[4] Xiaotie Deng,et al. Analysis and Improvement of a Signcryption Scheme with Key Privacy , 2005, ISC.
[5] Chik How Tan. Analysis of improved signcryption scheme with key privacy , 2006, Inf. Process. Lett..
[6] Yiliang Han,et al. Adaptive secure multicast in wireless networks , 2009, Int. J. Commun. Syst..
[7] Xu Ming,et al. A Survey of Research on Key Management for Multicast , 2004 .
[8] Kyung-Ah Shim,et al. New DSA-Verifiable Signcryption Schemes , 2002, ICISC.
[9] Yiliang Han. Generalization of signcryption for resources-constrained environments , 2007, Wirel. Commun. Mob. Comput..
[10] Wang Shuang-jin. Identity-based Broadcast Signcryption with Proxy Re-signature , 2013 .
[11] Chik How Tan. On the Security of Signcryption Scheme with Key Privacy , 2005, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[12] Wenbo Mao,et al. Two Birds One Stone: Signcryption Using RSA , 2003, CT-RSA.
[13] Johann van der Merwe,et al. A survey on peer-to-peer key management for mobile ad hoc networks , 2007, CSUR.
[14] Xavier Boyen,et al. Multipurpose Identity-Based Signcryption (A Swiss Army Knife for Identity-Based Cryptography) , 2003, CRYPTO.
[15] Han Yi. New ECDSA-Verifiable Generalized Signcryption , 2006 .
[16] Zhenfu Cao,et al. Efficient and Provably Secure Multi-receiver Identity-Based Signcryption , 2006, ACISP.
[17] Mihir Bellare,et al. Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.
[18] Mingwu Zhang,et al. Efficient Identity-Based Signcryption Scheme for Multiple Receivers , 2007, ATC.