欢迎您!
东篱公司
退出
申报数据库
申报指南
立项数据库
成果数据库
期刊论文
会议论文
著 作
专 利
项目获奖数据库
位置:
成果数据库
>
期刊
> 期刊详情页
Secret Handshakes from ID-Based Message Recovery Signature: A New Generic Approach
ISSN号:0045-7906
期刊名称:Computers & Electrical Engineering
时间:2012.1.1
页码:96-104
相关项目:不经意传输的理论与新应用研究
作者:
温雅敏|张方国|徐玲玲|
关于张方国:
匿名信用证书系统及其应用研究
期刊论文 25
会议论文 10
著作 2
抗击强攻击者的安全多方计算理论及其应用研究
期刊论文 3
不经意传输的理论与新应用研究
期刊论文 32
会议论文 16
专利 3
超椭圆曲线密码体制相关问题的研究
超椭圆曲线密码体制相关问题的研究
基于双线性对的密码体制的研究
期刊论文 17
会议论文 14
著作 4
多线性映射与安全混淆
期刊论文 1
基于双线性对的密码体制在保护隐私与匿名性中的应用
可证明安全会议2009
同期刊论文项目
不经意传输的理论与新应用研究
期刊论文 32
会议论文 16
专利 3
同项目期刊论文
An Efficient Collision Detection Method for Computing Discrete Logarithms with Pollard's Rho
椭圆曲线在密码中的应用:过去,现在,将来…
Delegatable secret handshake scheme
Cryptoanalysis and improvement of smart prepayment meter protocol in standard Q/GDW 365
二元Edwards曲线的半分算法
ECC-Based Grouping-Proof RFID for Inpatient Medication Safety
Improved Pollard rho method for computing discrete logarithms over finite extension fields
Oblivious transfer with access control and identity-based encryption with anonymous key issuing
Times limited accountable anonymous online submission control system from single-verifier k-times gr
Fully CCA2 secure identity-based broadcast encryption with black-box accountable authority
Efficient precomputation schemes of
Scalar multiplication on Kummer surface revisited
Timed ‐ release oblivious transfer
Tracing and revoking scheme for dynamic privileges against pirate rebroadcast
Speeding up elliptic curve discrete logarithm computations with point halving
Secure Hamming distance based record linkage with malicious adversaries
Public-key encryption scheme with selective opening chosen-ciphertext security based on the Decision
Computing elliptic curve discrete logarithms with the negation map
A Class of 1-Resilient Functions in Odd Variables with High Nonlinearity and Suboptimal Algebraic Im
Secure similarity coefficients computation for binary data and its extensions
Discrete logarithm based chameleon hashing and signatures without key exposure
Outsourcing computation of modular exponentiations in cloud computing