[1] |
YE Qing, YANG Xiaomeng, QIN Panke, ZHAO Zongqu, TANG Yongli.
Novel Against Quantum Attacks Group Signature Scheme Based on NTRU Lattice
[J]. Computer Engineering and Applications, 2020, 56(2): 89-96.
|
[2] |
CHEN Hong, ZHU Yanan, XIAO Chenglong, JIN Haibo, ZHANG Zihao.
Publicly Verifiable Certificateless Multi-receiver Anonymous Signcryption
[J]. Computer Engineering and Applications, 2020, 56(19): 120-125.
|
[3] |
NIU Shufen, YANG Xiyan, LI Zhenbin, WANG Caifen.
Hybrid Signcryption Scheme Based on Heterogeneous System
[J]. Computer Engineering and Applications, 2019, 55(3): 61-67.
|
[4] |
LI Yarong1,LI Xiao1,GE Lixia1,HE Mingxing2.
Improved multi-message and multi-receiver hybrid signcryption scheme
[J]. Computer Engineering and Applications, 2018, 54(19): 77-81.
|
[5] |
WANG Shuo1, CHENG Xiangguo1, CHEN Yameng2, WANG Yue1.
ID-based key-insulated group signature scheme
[J]. Computer Engineering and Applications, 2018, 54(16): 76-80.
|
[6] |
LIU Jiajia, LIU Jianhua.
Fuzzy attribute-based signcryption scheme with constant length ciphertext
[J]. Computer Engineering and Applications, 2017, 53(5): 128-133.
|
[7] |
LIU Jianhua1,2, ZHAO Changxiao2, MAO Kefei3.
Efficient certificateless aggregate signcryption scheme based on XOR
[J]. Computer Engineering and Applications, 2016, 52(12): 131-135.
|
[8] |
YU Jing1, LI Zhihui2.
Threshold proxy multi-signature scheme
[J]. Computer Engineering and Applications, 2015, 51(6): 69-71.
|
[9] |
LI Huige, ZHANG Jianzhong.
New certificateless signcryption scheme
[J]. Computer Engineering and Applications, 2014, 50(5): 86-89.
|
[10] |
GUO Shuai1, XIE Shucui2.
Secret sharing scheme based on elliptic curves
[J]. Computer Engineering and Applications, 2013, 49(6): 97-99.
|
[11] |
SHI Dongsheng.
Strongly secure certificateless signcryption scheme in standard model
[J]. Computer Engineering and Applications, 2013, 49(22): 90-94.
|
[12] |
LIU Xin1,2,3.
Member ID-based group signature with online extractors
[J]. Computer Engineering and Applications, 2013, 49(2): 113-118.
|
[13] |
ZHANG Kai, ZHANG Jianzhong.
Analysis and improvement of a group signature scheme
[J]. Computer Engineering and Applications, 2013, 49(19): 75-78.
|
[14] |
LI Haifeng1, LAN Caihui2, ZUO Weiping1, MA Haiyun1.
ID-based threshold group signature scheme without trusted party
[J]. Computer Engineering and Applications, 2012, 48(32): 89-93.
|
[15] |
SHU Jian.
Analysis and improvement of certificateless two-party key agreement scheme
[J]. Computer Engineering and Applications, 2012, 48(3): 21-23.
|