Construction of Certificateless Proxy Signcryption Scheme From CMGs
暂无分享,去创建一个
[1] Robert H. Deng,et al. Cryptanalysis of a certificateless signcryption scheme in the standard model , 2011, Inf. Sci..
[2] Chun-I Fan,et al. Provably secure randomized blind signature scheme based on bilinear pairing , 2010, Comput. Math. Appl..
[3] Jianmin Li,et al. Identity-Based Proxy Signcryption Protocol with Universal Composability , 2018, Secur. Commun. Networks.
[4] Caixue Zhou,et al. Identity Based Generalized Proxy Signcryption Scheme , 2016, Inf. Technol. Control..
[5] Yining Liu,et al. E-Voting Scheme Using Secret Sharing and K-Anonymity , 2016, BWCCA.
[6] Fagen Li,et al. Leakage-Free and Provably Secure Certificateless Signcryption Scheme Using Bilinear Pairings , 2015, Comput. J..
[7] Yu Hui,et al. Identity-Based Hybrid Signcryption Scheme Using ECC , 2015 .
[8] Han Wen. Certificateless Signcryption Scheme with Proxy Unsigncryption , 2011 .
[9] Zhe Xia,et al. Privacy-preserving raw data collection without a trusted authority for IoT , 2019, Comput. Networks.
[10] Xie Yong,et al. ElGamal Broadcasting Multi-Signcryption Protocol with UC Security , 2019 .
[11] Manuel Barbosa,et al. Certificateless signcryption , 2008, ASIACCS '08.
[12] Bo Yang,et al. Low-computation certificateless hybrid signcryption scheme , 2017, Frontiers of Information Technology & Electronic Engineering.
[13] Yi Mu,et al. On the security of a certificateless signcryption scheme , 2013, 2014 IEEE Workshop on Electronics, Computer and Applications.
[14] Fagen Li,et al. An efficient signcryption for data access control in cloud computing , 2017, Computing.
[15] Fagen Li,et al. Secure identity-based signcryption in the standard model , 2013, Math. Comput. Model..
[16] Jussipekka Leiwo,et al. An Efficient Scheme for Secure Message Transmission using Proxy-Signcryption , 1998 .
[17] Yang Ming,et al. Proxy signcryption scheme in the standard model , 2015, Secur. Commun. Networks.
[18] Yupu Hu,et al. Certificateless signcryption scheme in the standard model , 2010, Inf. Sci..
[19] Eiji Okamoto,et al. Proxy signatures for delegating signing operation , 1996, CCS '96.