UM

Browse/Search Results:  1-4 of 4 Help

Selected(0)Clear Items/Page:    Sort:
Proxy signature in the standard model: constructing security model and proving security Journal article
Ruan Jian Xue Bao/Journal of Software, 2012,Volume: 23,Issue: 9,Page: 2416-2429
Authors:  Gu K.;  Jia W.-J.;  Wang S.-C.;  Shi L.-W.
Favorite  |  View/Download:2/0  |  Submit date:2019/02/11
CDHP  Identity  Provable security  Proxy signature  
A group proxy signature scheme based on sub-secret evolution Journal article
Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2012,Volume: 49,Issue: 5,Page: 962-973
Authors:  Gu K.;  Jia W.;  Jiang C.
Favorite  |  View/Download:3/0  |  Submit date:2019/02/11
CDHP  Cellular automata  Provable security  Proxy signature  Sub-secret evolution  
A group proxy signature scheme based on key matrix Journal article
Sichuan Daxue Xuebao (Gongcheng Kexue Ban)/Journal of Sichuan University (Engineering Science Edition), 2011,Volume: 43,Issue: 4,Page: 108-115
Authors:  Gu K.;  Jia W.-J.;  Jiang C.-L.
Favorite  |  View/Download:6/0  |  Submit date:2019/02/11
Bilinear transformation  CDHP  Key matrix  Proxy signature  
Efficient and secure identity-based signature scheme Journal article
Ruan Jian Xue Bao/Journal of Software, 2011,Volume: 22,Issue: 6,Page: 1350-1360
Authors:  Gu K.;  Jia W.-J.;  Jiang C.-L.
Favorite  |  View/Download:2/0  |  Submit date:2019/02/11
CDHP  Computational efficiency  Provable security  Signature  Standard model