[1] |
LIU Xiang-zhen1,ZHANG Yu-lei1,LANG Xiao-li1,LUO Guang-ping1,WANG Cai-fen2.
A provably secure privacy-preserving multi-recipient
heterogeneous aggregate signcryption scheme
[J]. Computer Engineering & Science, 2020, 42(03): 441-448.
|
[2] |
ZHANG Yulei1,LIU Xiangzhen1,ZHANG Yongjie2,LUO Guangping1,CHEN Wenjuan1,WANG Caifen1.
A provable secure from CLPKC to IDPKC
online/offline heterogeneous signcryption scheme
[J]. Computer Engineering & Science, 2019, 41(05): 813-820.
|
[3] |
NIU Shufen,LI Zhenbin,WANG Caifen.
An anonymous heterogeneous aggregate
signcryption scheme for vehicular networks
[J]. Computer Engineering & Science, 2019, 41(01): 80-87.
|
[4] |
CAO Suzhen1,DAI Wenjie1,WANG Caifen1,WANG Xiuya1,SUN Han1,ZUO Weiping2.
Analysis and improvement of an ID-based
partially blind signature scheme
[J]. Computer Engineering & Science, 2018, 40(12): 2193-2197.
|
[5] |
NIU Shu-fen,NIU Ling,WANG Cai-fen,YANG Xi-yan,JIA Xiang-dong.
Privacy-preserving multi-recipient aggregate signcryption
for heterogeneous cryptography systems
[J]. Computer Engineering & Science, 2018, 40(05): 805-812.
|
[6] |
ZUO Li-ming1,2,ZHANG Ting-ting1,2,GUO Hong-li1,2,CHEN Zuo-song1,2.
Attack and improvement on an ID-based
partially blind signature scheme
[J]. Computer Engineering & Science, 2017, 39(10): 1832-1836.
|
[7] |
WANG Yun1,LU Dianjun2.
A parallel multi-signcryption scheme
based on self-certified cryptography
[J]. Computer Engineering & Science, 2017, 39(04): 684-688.
|
[8] |
YANG Xiaodong,GAO Guojuan,LI Yanan,LU Xiaoyong,WANG Caifen.
A serveraided verification signature
scheme against collusion attacks
[J]. J4, 2016, 38(07): 1350-1355.
|
[9] |
ZHOU Ming,WANG Jian.
An efficient and provably secure proxy blind signature scheme
[J]. J4, 2015, 37(09): 1643-1651.
|
[10] |
WANG Yun1,LU Dianjun2.
Safety of self-certified signcryption scheme
[J]. J4, 2015, 37(07): 1280-1283.
|
[11] |
CHEN Ming.
Identity-based multi-recipient signcryption key
encapsulation in the standard model
[J]. J4, 2015, 37(04): 719-725.
|
[12] |
ZHENG Minghui,LIU Zhaozhao.
Research on tripartite key establishment
protocol for wireless sensor networks
[J]. J4, 2014, 36(11): 2132-2136.
|
[13] |
DENG Yuqiao.
Dynamic attributebased encryption scheme
[J]. J4, 2014, 36(06): 1083-1087.
|
[14] |
WANG Yun.
Attacks and improvement of two
self-certified signcryption schemes
[J]. J4, 2014, 36(05): 856-859.
|
[15] |
DENG Lunzhi,WANG Xiangbin,QU Yunyun.
High-efficient signcryption scheme based on identity
[J]. J4, 2014, 36(03): 441-445.
|