Identity-Based Proxy Signcryption Protocol with Universal Composability
暂无分享,去创建一个
[1] Kefei Chen,et al. Identity based proxy-signcryption scheme from pairings , 2004, IEEE International Conference onServices Computing, 2004. (SCC 2004). Proceedings. 2004.
[2] Jussipekka Leiwo,et al. An Efficient Scheme for Secure Message Transmission using Proxy-Signcryption , 1998 .
[3] Tian You. Universally Composable Mechanism for Group Communication , 2012 .
[4] Liu Jiqiang,et al. A Universally Composable Secure Group Ownership Transfer Protocol for RFID Tags , 2015 .
[5] Caixue Zhou,et al. Identity Based Generalized Proxy Signcryption Scheme , 2016, Inf. Technol. Control..
[6] Chun-I Fan,et al. Provably secure randomized blind signature scheme based on bilinear pairing , 2010, Comput. Math. Appl..
[7] Ran Canetti,et al. Universally composable security: a new paradigm for cryptographic protocols , 2001, Proceedings 2001 IEEE International Conference on Cluster Computing.
[8] Li Fang-wei. Efficient identity-based proxy signcryption scheme , 2011 .
[9] Jian-Feng Ma,et al. Universally Composable Mechanism for Group Communication: Universally Composable Mechanism for Group Communication , 2012 .
[10] Ran Canetti,et al. Universally composable signature, certification, and authentication , 2004, Proceedings. 17th IEEE Computer Security Foundations Workshop, 2004..
[11] Tian You-lian. Universally composable secure multiparty computation protocol with fairness , 2014 .
[12] Wang Yu-min. Efficient identity-based proxy signcryption , 2007 .
[13] Eiji Okamoto,et al. Proxy signatures for delegating signing operation , 1996, CCS '96.
[14] Mingwu Zhang,et al. Accountable mobile E-commerce scheme in intelligent cloud system transactions , 2018, J. Ambient Intell. Humaniz. Comput..
[15] Bo Yang,et al. Low-computation certificateless hybrid signcryption scheme , 2017, Frontiers of Information Technology & Electronic Engineering.