Privacy-preserving multi-receiver signcryption scheme for heterogeneous systems
暂无分享,去创建一个
Yahong Li | Caifen Wang | Yulei Zhang | Shufen Niu | Caifen Wang | Yulei Zhang | Shufen Niu | Yahong Li
[1] Aggeliki Sgora,et al. A survey on security and privacy issues in Wireless Mesh Networks , 2016, Secur. Commun. Networks.
[2] Yuxiang Wang,et al. Construction of Tree Network with Limited Delivery Latency in Homogeneous Wireless Sensor Networks , 2014, Wirel. Pers. Commun..
[3] Bo Zhang,et al. An ID-Based Anonymous Signcryption Scheme for Multiple Receivers Secure in the Standard Model , 2010, AST/UCMA/ISA/ACN.
[4] Jean-Luc Danger,et al. Sophisticated security verification on routing repaired balanced cell-based dual-rail logic against side channel analysis , 2015, IET Inf. Secur..
[5] Silvio Micali,et al. Public-Key Encryption in a Multi-user Setting: Security Proofs and Improvements , 2000, EUROCRYPT.
[6] Kenneth G. Paterson,et al. Certificateless Public Key Cryptography , 2003 .
[7] Zhenfei Zhang,et al. Mobile ad-hoc network key management with certificateless cryptography , 2008, 2008 2nd International Conference on Signal Processing and Communication Systems.
[8] Mingwu Zhang,et al. Efficient Identity-Based Signcryption Scheme for Multiple Receivers , 2007, ATC.
[9] Yuliang Zheng,et al. Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption) , 1997, CRYPTO.
[10] Guomin Yang,et al. Heterogeneous Signcryption with Key Privacy , 2011, Comput. J..
[11] Jin Wang,et al. A Variable Threshold-Value Authentication Architecture for Wireless Mesh Networks , 2014 .
[12] Hui Li,et al. Efficient signcryption between TPKC and IDPKC and its multi-receiver construction , 2010, Science China Information Sciences.
[13] Fagen Li,et al. A new multi-receiver ID-based signcryption scheme for group communications , 2009, 2009 International Conference on Communications, Circuits and Systems.
[14] Chun-I Fan,et al. Anonymous Multireceiver Identity-Based Encryption , 2010, IEEE Transactions on Computers.
[15] C. Pandu Rangan,et al. An Efficient Identity-Based Signcryption Scheme for Multiple Receivers , 2009, IWSEC.
[16] Lei Zhang,et al. Cryptanalysis of a Certificateless Multi-receiver Signcryption Scheme , 2010, 2010 International Conference on Multimedia Information Networking and Security.
[17] Baowen Xu,et al. An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks , 2015, IEEE Transactions on Information Forensics and Security.
[18] Xian Wang,et al. An efficient certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks , 2015, Inf. Sci..
[19] Lu Gao,et al. Completely Anonymous Multi-Recipient Signcryption Scheme with Public Verification , 2013, PloS one.
[20] Sunder Lal,et al. Anonymous ID Based Signcryption Scheme for Multiple Receivers , 2009, IACR Cryptol. ePrint Arch..
[21] Jian Shen,et al. A Novel Routing Protocol Providing Good Transmission Reliability in Underwater Sensor Networks , 2015 .
[22] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[23] Arati Baliga,et al. Secure, pseudonymous, and auditable communication in vehicular ad hoc networks , 2008, Secur. Commun. Networks.
[24] Zhenfu Cao,et al. Efficient and Provably Secure Multi-receiver Identity-Based Signcryption , 2006, ACISP.
[25] Hui Zhang,et al. Efficient Signcryption for Heterogeneous Systems , 2013, IEEE Systems Journal.
[26] Jianhong Zhang,et al. Efficient Provable Secure ID-Based Anonymous Signcryption Scheme , 2009, 2009 Pacific-Asia Conference on Circuits, Communications and Systems.