欢迎您!
东篱公司
退出
申报数据库
申报指南
立项数据库
成果数据库
期刊论文
会议论文
著 作
专 利
项目获奖数据库
位置:
成果数据库
>
期刊
> 期刊详情页
On Security of Two Nonrepudiable Threshold Multi-proxy Multi-signature Schemes with Shared Verificat
ISSN号:1816-353X
期刊名称:International Journal of Network Security
时间:0
页码:248-253
语言:中文
相关项目:基于移动代理的密码理论体系及其应用
作者:
Jun Shao|Zhenfu Cao|Rongxing Lu|
同期刊论文项目
基于移动代理的密码理论体系及其应用
期刊论文 43
会议论文 13
著作 1
同项目期刊论文
Provably secure robust threshold partial blind signature
Self-encryption remote user anonymous authentication scheme using smart cards
An improved deniable authentication protocol
Braid-based bit commitment protocol
ID-based authenticated key agreement protocol for peer-to-peer computing
Authenticated encryption protocol with perfect forward secrecy for mobile communication
How to compute modular exponentiation with large operators based on the right-to-left binary algorit
Certificateless Authenticated Key Agreement Based on the MTI/C0 Protocol
Proofs of security for improved Rabin signature scheme
A Secure Proxy Signcryption Scheme Based on Discrete Logarithm Problem
Universal encrypted deniable authentication protocol
A New Practical Limited Identity- Based Encryption Scheme
Group Oriented Identity-Based Deniable Authentication Protocol from the Bilinear Pairings
Identity based proxy multi-signature
Provably secure identity-based authenticated key agreement protocols in the standard model
A new ID-based deniable authentication protocol
Improvement of Yang et al.'s threshold proxy signature scheme
Simple three-party key exchange protocol
Efficient and secure protocol in fair document exchange
Designing efficient proxy signature schemes for mobile communication
New designing of cryptosystems based on quadratic fields
Efficient identity-based authenticated key agreement with PKG forward secrecy
Efficient certificateless authentication and key agreement (CL-AK) for grid computing
New cryptanalysis paradigm on a nonce-based mutual authentication scheme
Non-interactive and non-malleable commitment scheme based on q-one way group homomorphisms
A simple user authentication scheme for grid computing
Efficient ID-Based Multi-Decrypter Encryption with Short Ciphertexts
An ID-Based Authenticated Key Agreement Protocol for Peer-to-Peer Computing
A Self-Encryption Remote User Anonymous Authentication Scheme Usina Smart Cards
Password-Based Group Key Agreement Protocol for Client-Server Application
Efficient Certificateless Authenticated Key Agreement Protocol from Pairings
A Secure Anonymous Internet Electronic Voting Scheme Based on the Polynomial
Escrow-Free Certificate-Based Authenticated Key Agreement Protocol from Pairings
The Braid-Based Bit Commitment Protocol