An Identity Based Proxy Signcryption Scheme without Pairings
暂无分享,去创建一个
[1] Caixue Zhou,et al. Identity Based Generalized Proxy Signcryption Scheme , 2016, Inf. Technol. Control..
[2] Jianhua Chen,et al. An ID-based proxy signature schemes without bilinear pairings , 2011, Ann. des Télécommunications.
[3] Min-Shiang Hwang,et al. Generalization of proxy signature based on elliptic curves , 2004, Comput. Stand. Interfaces.
[4] Jian Shen,et al. Efficient certificateless anonymous multi-receiver encryption scheme for mobile devices , 2017, Soft Comput..
[5] Muhammad Junaid,et al. A novel proxy blind signcryption scheme based on hyper elliptic curve , 2016, 2016 12th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD).
[6] Feng Wang,et al. Secure and Efficient Identity-based Proxy Multi-signature Using Cubic Residues , 2016, Int. J. Netw. Secur..
[7] Junjie Yang,et al. A Novel Identity-Based Signcryption Scheme in the Standard Model , 2017, Inf..
[8] Tarunpreet Bhatia,et al. Cryptanalysis and improvement of certificateless proxy signcryption scheme for e-prescription system in mobile cloud computing , 2017, Annals of Telecommunications.
[9] Addepalli V. N. Krishna,et al. Window Method Based Cubic Spline Curve Public Key Cryptography , 2016 .
[10] Meng Wang,et al. Efficient Identity Based Proxy-Signcryption Schemes with Forward Security and Public Verifiability , 2005, ICCNMC.
[11] Jussipekka Leiwo,et al. An Efficient Scheme for Secure Message Transmission using Proxy-Signcryption , 1998 .
[12] Rajeev Anand Sahu,et al. A secure anonymous proxy signcryption scheme , 2017, J. Math. Cryptol..
[13] Kefei Chen,et al. Identity based proxy-signcryption scheme from pairings , 2004, IEEE International Conference onServices Computing, 2004. (SCC 2004). Proceedings. 2004.
[15] Wu Jian,et al. Identity-based proxy signcryption schemes , 2012, 2012 First National Conference for Engineering Sciences (FNCES 2012).
[16] Min-Shiang Hwang,et al. A new proxy signature scheme with revocation , 2005, Appl. Math. Comput..
[17] Han-Yu Lin,et al. Efficient proxy signcryption scheme with provable CCA and CMA security , 2010, Comput. Math. Appl..
[18] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.
[19] Yuliang Zheng,et al. Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption) , 1997, CRYPTO.
[20] Jia-Lun Tsai,et al. A Provably Secure Proxy Signcryption Scheme Using Bilinear Pairings , 2014, J. Appl. Math..
[21] Mihir Bellare,et al. Multi-signatures in the plain public-Key model and a general forking lemma , 2006, CCS '06.
[22] Min-Shiang Hwang,et al. Generalization of proxy signature-based on discrete logarithms , 2003, Comput. Secur..
[23] P. Vasudeva Reddy,et al. An Efficient ID-Based Proxy Signcryption Scheme , 2012 .
[24] Peeter Laud,et al. Strong Forward Security in Identity-Based Signcryption , 2013, IACR Cryptol. ePrint Arch..
[25] Xiaoming Hu,et al. Short and provably secure designated verifier proxy signature scheme , 2016, IET Inf. Secur..
[26] Jean-Jacques Quisquater,et al. A new identity based signcryption scheme from pairings , 2003, Proceedings 2003 IEEE Information Theory Workshop (Cat. No.03EX674).
[27] Yue Zhang,et al. A Provable Secure Identity-based Generalized Proxy Signcryption Scheme , 2018, Int. J. Netw. Secur..
[28] Lunzhi Deng,et al. Identity Based Proxy Signature from RSA without Pairings , 2017, Int. J. Netw. Secur..
[29] G. P. Biswas,et al. A practical identity based signcryption scheme from bilinear pairing , 2016, 2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI).