An efficient ID‐based cryptographic technique using IFP and GDLP
暂无分享,去创建一个
Chandrashekhar Meshram | Sarita Gajbhiye Meshram | Rabha W. Ibrahim | Kailash W. Kalare | Sunil D. Bagde | S. G. Meshram | R. Ibrahim | C. Meshram | K. Kalare | S. Bagde
[1] Cheng-Chi Lee,et al. An efficient ID-based cryptographic transformation model for extended chaotic-map-based cryptosystem , 2018, Soft Comput..
[2] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[3] Md Whaiduzzaman,et al. An Identity-Based Encryption Scheme for Data Security in Fog Computing , 2018, IJCCI.
[4] Mingwu Zhang,et al. An ID-based cryptographic mechanisms based on GDLP and IFP , 2012, Inf. Process. Lett..
[5] Cheng-Chi Lee,et al. A secure key authentication scheme for cryptosystems based on GDLP and IFP , 2017, Soft Comput..
[6] Chandrashekhar Meshram,et al. Constructing ID-based cryptographic technique for IFP and GDLP based cryptosystem , 2017 .
[7] Craig Gentry,et al. Hierarchical ID-Based Cryptography , 2002, ASIACRYPT.
[8] Chun-Ta Li,et al. An efficient online/offline ID-based short signature procedure using extended chaotic maps , 2018, Soft Computing.
[9] Cheng-Chi Lee,et al. OOS-SSS: An Efficient Online/Offline Subtree-Based Short Signature Scheme Using Chebyshev Chaotic Maps for Wireless Sensor Network , 2020, IEEE Access.
[10] Liaojun Pang,et al. nMIBAS: A Novel Multi-Receiver ID-Based Anonymous Signcryption with Decryption Fairness , 2013, Comput. Informatics.
[11] Mohammad S. Obaidat,et al. An ID-based Quadratic-Exponentiation Randomized Cryptographic scheme , 2015, 2015 International Conference on Computer, Information and Telecommunication Systems (CITS).
[12] Cheng-Chi Lee,et al. A subtree‐based transformation model for cryptosystem using chaotic maps under cloud computing environment for fuzzy user data sharing , 2020, Int. J. Commun. Syst..
[13] Fagen Li,et al. IBEET-RSA: Identity-Based Encryption with Equality Test over RSA for Wireless Body Area Networks , 2019, Mobile Networks and Applications.
[14] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[15] Dan Boneh,et al. Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles , 2004, IACR Cryptol. ePrint Arch..
[16] Cheng-Chi Lee,et al. Efficient online/offline IBSS protocol using partial discrete logarithm for WSNs , 2018, IET Networks.
[17] Chandrashekhar Meshram,et al. An efficient ID-based cryptographic encryption based on discrete logarithm problem and integer factorization problem , 2015, Inf. Process. Lett..
[18] Chandrashekhar Meshram,et al. An identity based beta cryptosystem , 2011, 2011 7th International Conference on Information Assurance and Security (IAS).
[19] Toshiya Itoh,et al. An ID-based cryptosystem based on the discrete logarithm problem , 1989, IEEE J. Sel. Areas Commun..
[20] Clifford C. Cocks. An Identity Based Encryption Scheme Based on Quadratic Residues , 2001, IMACC.
[21] Cheng-Chi Lee,et al. An IND-ID-CPA Secure ID-Based Cryptographic Protocol using GDLP and IFP , 2017, Informatica.
[22] Cheng-Chi Lee,et al. An identity-based encryption technique using subtree for fuzzy user data sharing under cloud computing environment , 2019, Soft Comput..
[23] Chandrashekhar Meshram,et al. An identity-based cryptographic model for discrete logarithm and integer factoring based cryptosystem , 2013, Inf. Process. Lett..