UM

Browse/Search Results:  1-2 of 2 Help

Selected(0)Clear Items/Page:    Sort:
Identity-based group proxy signature scheme in the standard model Journal article
Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2013,Volume: 50,Issue: 7,Page: 1370-1386
Authors:  Gu K.;  Jia W.;  Li C.;  Chen R.
Favorite  |  View/Download:3/0  |  Submit date:2019/02/11
CDH problem  Group proxy signature  Identity  Provable security  Security model  
A group proxy signature scheme based on key matrix Journal article
Sichuan Daxue Xuebao (Gongcheng Kexue Ban)/Journal of Sichuan University (Engineering Science Edition), 2011,Volume: 43,Issue: 4,Page: 108-115
Authors:  Gu K.;  Jia W.-J.;  Jiang C.-L.
Favorite  |  View/Download:6/0  |  Submit date:2019/02/11
Bilinear transformation  CDHP  Key matrix  Proxy signature