UM

Browse/Search Results:  1-7 of 7 Help

Selected(0)Clear Items/Page:    Sort:
Secure and efficient multi-proxy signature scheme in the standard model Journal article
Chinese Journal of Electronics, 2016,Volume: 25,Issue: 1,Page: 93-99
Authors:  Gu K.;  Jia W.;  Deng Y.;  Nie X.
Favorite  |  View/Download:2/0  |  Submit date:2019/02/11
Computational Diffie-Hellman (CDH) assumption  Efficiency  Multi-proxy signature  Provable security  
Secure and efficient proxy signature scheme in the standard model Journal article
Chinese Journal of Electronics, 2013,Volume: 22,Issue: 4,Page: 666-670
Authors:  Gu K.;  Jia W.;  Chen R.;  Liu X.
Favorite  |  View/Download:2/0  |  Submit date:2019/02/11
Computational diffle-hellman (cdh) assumption  Efficiency  Provable security  Proxy signature  Security model  
Identity-based group proxy signature scheme in the standard model Journal article
Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2013,Volume: 50,Issue: 7,Page: 1370-1386
Authors:  Gu K.;  Jia W.;  Li C.;  Chen R.
Favorite  |  View/Download:3/0  |  Submit date:2019/02/11
CDH problem  Group proxy signature  Identity  Provable security  Security model  
Proxy signature in the standard model: constructing security model and proving security Journal article
Ruan Jian Xue Bao/Journal of Software, 2012,Volume: 23,Issue: 9,Page: 2416-2429
Authors:  Gu K.;  Jia W.-J.;  Wang S.-C.;  Shi L.-W.
Favorite  |  View/Download:2/0  |  Submit date:2019/02/11
CDHP  Identity  Provable security  Proxy signature  
A group proxy signature scheme based on sub-secret evolution Journal article
Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2012,Volume: 49,Issue: 5,Page: 962-973
Authors:  Gu K.;  Jia W.;  Jiang C.
Favorite  |  View/Download:3/0  |  Submit date:2019/02/11
CDHP  Cellular automata  Provable security  Proxy signature  Sub-secret evolution  
An anonymous wireless authentication protocol based on proxy signature Journal article
Journal of Computational Information Systems, 2012,Volume: 8,Issue: 2,Page: 541-548
Authors:  Jiang C.;  Jia W.;  Gu K.
Favorite  |  View/Download:3/0  |  Submit date:2019/02/11
Anonymity  Authentication  Key exchange  Proxy signature  
A group proxy signature scheme based on key matrix Journal article
Sichuan Daxue Xuebao (Gongcheng Kexue Ban)/Journal of Sichuan University (Engineering Science Edition), 2011,Volume: 43,Issue: 4,Page: 108-115
Authors:  Gu K.;  Jia W.-J.;  Jiang C.-L.
Favorite  |  View/Download:7/0  |  Submit date:2019/02/11
Bilinear transformation  CDHP  Key matrix  Proxy signature