欢迎您!
东篱公司
退出
申报数据库
申报指南
立项数据库
成果数据库
期刊论文
会议论文
著 作
专 利
项目获奖数据库
位置:
成果数据库
>
期刊
> 期刊详情页
A New Threshold Signature Sche
时间:0
相关项目:计算机通信
作者:
Jun Shao, Rongxing Lu, and Zhe
同期刊论文项目
计算机通信
期刊论文 108
会议论文 31
著作 6
同项目期刊论文
Nonrepudiable threshold proxy
Off-line Password Guessing Att
A Directed Signature Scheme Ba
Provably Secure Robust Thresho
Security of an Efficient ID-Ba
An elliptic curve restrictive
Authenticated encryption proto
A New ID-based Deniable Authen
A new deniable authentication
Braid-based Bit Commitment
Designing efficient proxy sign
Proxy signature scheme using s
A dynamic threshold commercial
Formailzed Security Model of M
Efficient Identity-Based Authe
Cryptanalysis of Li-Tzeng-Hwan
Authorization-Limited Transfor
How to compute modular exponen
A robust ID-based threshold si
Improvement on Tzeng et al.'s
Designated verifier proxy sign
An efficient proxy-protected s
Certificateless Authenticated
Improved public key authentica
Provably secure proxy-protecte
Threshold password authenticat
Remarks on a new key authentic
A Secure Anonymous Routing Pro
Factoring-Based Proxy Signatur
Novel forgery method based on
Proxy blind multi-signature sc
Threshold undeniable signature
Biased bit commitment and appl
Efficient ID-based Multi-Decry
Identity-based threshold proxy
Security of Pon-Lu-Jeng's Meta
Proofs of security for improve
Group Oriented Identity-Based
Non-interactive deniable authe
A forward secure remote authen
Identity-Based Proxy Multi-Sig
Efficient pairing-based thresh
Erratum to "Non-interactive de
On Security of Two Nonrepudiab
A robust (k, n) + 1 threshold
Z_N - trees and public-key cry
The simultaneous Pell equation
Existence of V(9, t) vectors
More Efficient Identity-Based
A Self-Encryption Remote User
Proofs of security for improved Rabin signature scheme
两类强壮的门限密钥托管方案
一个新的具有指定接收者门限签
代理多重签名的形式化模型及一个
代理签名的现状与进展
具有指定接收组(t, n)门限共享验
基于双难题的两个数字签名方案的
Combinatorial Characterization
Factoring based proxy signatur
Efficient Password-based Authe
An application of a lower boun
Remarks on Wu–Hsu's threshold
An Identity-Based Strong Desig
A secure anonymous internet el
A kind of signature schemes ba
Convertible Proxy Signcryption
Password-Based Group Key Agree
Nonrepudiable proxy multi - si
A Secure Proxy Signcryption Sc
An Efficient Provable Secure I
The exponontial Diophantine eq
Improvement of Yang et al.'s t
Improvement of Lee-Kim-Yoo's r
A generalized proxy signature
Super-simple balanced incomple
Construct secure proxy cryptos
A proxy signature scheme as se
Efficient and provably secure
Encryption Based on Reversible
A Novel ID-Based Partial Deleg
An Improved Deniable Authentic
Efficient remote user authenti
Existence of APAV(q,k) with q
Efficient ID-Based Proxy Signa
Simple three-party key exchang
A new efficient (t, n) verifia
A threshold proxy signature sc
Simulatability and security of
A new threshold proxy signatur
Comment: cryptanalysis of Lee-
A nonrepudiable multi-proxy mu
An ID-based Authenticated Key
A traceable threshold signatur
虚二次域类数的可除性
Efficient ID-Based Multi-Decrypter Encryption with Short Ciphertexts
代理多重签名的形式化模型及一个新的体制
Security Analysis and Improvement of Some Threshold Proxy Signature Schemes
An ID-Based Authenticated Key Agreement Protocol for Peer-to-Peer Computing
A Self-Encryption Remote User Anonymous Authentication Scheme Usina Smart Cards
Password-Based Group Key Agreement Protocol for Client-Server Application
Efficient Certificateless Authenticated Key Agreement Protocol from Pairings
A Secure Anonymous Internet Electronic Voting Scheme Based on the Polynomial
Escrow-Free Certificate-Based Authenticated Key Agreement Protocol from Pairings
The Braid-Based Bit Commitment Protocol