[1] |
CHENG Yage, HU Mingsheng, GONG Bei, WANG Lipeng, XU Erfeng.
Dynamic Threshold Signature Scheme with Strong Forward Security
[J]. Computer Engineering and Applications, 2020, 56(5): 125-134.
|
[2] |
CHEN Hong, ZHU Yanan, XIAO Chenglong, JIN Haibo, ZHANG Zihao.
Publicly Verifiable Certificateless Multi-receiver Anonymous Signcryption
[J]. Computer Engineering and Applications, 2020, 56(19): 120-125.
|
[3] |
ZHANG Ping, LI Yamin.
Forward Secure Elliptic Curve Digital Signature Scheme
[J]. Computer Engineering and Applications, 2020, 56(1): 115-120.
|
[4] |
NIU Shufen, YANG Xiyan, LI Zhenbin, WANG Caifen.
Hybrid Signcryption Scheme Based on Heterogeneous System
[J]. Computer Engineering and Applications, 2019, 55(3): 61-67.
|
[5] |
LI Yarong1,LI Xiao1,GE Lixia1,HE Mingxing2.
Improved multi-message and multi-receiver hybrid signcryption scheme
[J]. Computer Engineering and Applications, 2018, 54(19): 77-81.
|
[6] |
LIU Jiajia, LIU Jianhua.
Fuzzy attribute-based signcryption scheme with constant length ciphertext
[J]. Computer Engineering and Applications, 2017, 53(5): 128-133.
|
[7] |
LIU Jianhua1,2, ZHAO Changxiao2, MAO Kefei3.
Efficient certificateless aggregate signcryption scheme based on XOR
[J]. Computer Engineering and Applications, 2016, 52(12): 131-135.
|
[8] |
CAO Xin, WEI Shimin, ZHUO Zepeng.
Security analysis of three forward secure proxy signature schemes
[J]. Computer Engineering and Applications, 2015, 51(7): 98-100.
|
[9] |
YU Jing1, LI Zhihui2.
Threshold proxy multi-signature scheme
[J]. Computer Engineering and Applications, 2015, 51(6): 69-71.
|
[10] |
YANG Tonghao, LI Junquan, YU Bin.
Analysis and improvement of shared data integrity verification sheme
[J]. Computer Engineering and Applications, 2015, 51(22): 16-21.
|
[11] |
HE Bin, DU Weizhang.
Analysis and improvement of forward secure proxy blind signature scheme
[J]. Computer Engineering and Applications, 2015, 51(18): 104-108.
|
[12] |
LI Huige, ZHANG Jianzhong.
New certificateless signcryption scheme
[J]. Computer Engineering and Applications, 2014, 50(5): 86-89.
|
[13] |
GUO Shuai1, XIE Shucui2.
Secret sharing scheme based on elliptic curves
[J]. Computer Engineering and Applications, 2013, 49(6): 97-99.
|
[14] |
SHI Dongsheng.
Strongly secure certificateless signcryption scheme in standard model
[J]. Computer Engineering and Applications, 2013, 49(22): 90-94.
|
[15] |
ZHOU Ping1,2, HE Dake1.
Proxy blind signature schemes with forward secure property
[J]. Computer Engineering and Applications, 2012, 48(5): 51-53.
|