| [1] |
YE Qing, YANG Xiaomeng, QIN Panke, ZHAO Zongqu, TANG Yongli.
Novel Against Quantum Attacks Group Signature Scheme Based on NTRU Lattice
[J]. Computer Engineering and Applications, 2020, 56(2): 89-96.
|
| [2] |
WANG Shuo1, CHENG Xiangguo1, CHEN Yameng2, WANG Yue1.
ID-based key-insulated group signature scheme
[J]. Computer Engineering and Applications, 2018, 54(16): 76-80.
|
| [3] |
LIU Xin1,2,3.
Member ID-based group signature with online extractors
[J]. Computer Engineering and Applications, 2013, 49(2): 113-118.
|
| [4] |
ZHANG Kai, ZHANG Jianzhong.
Analysis and improvement of a group signature scheme
[J]. Computer Engineering and Applications, 2013, 49(19): 75-78.
|
| [5] |
WEN Ping1, MA Zhaofeng1,2, ZHAO Zhichao3, JIANG Ming1, NIU Xinxin1, YANG Yixian1.
Design and analysis of safety push VOD DRM system
[J]. Computer Engineering and Applications, 2012, 48(34): 69-75.
|
| [6] |
LI Haifeng1, LAN Caihui2, ZUO Weiping1, MA Haiyun1.
ID-based threshold group signature scheme without trusted party
[J]. Computer Engineering and Applications, 2012, 48(32): 89-93.
|
| [7] |
YANG Changhai.
Cryptanalysis of threshold group signature scheme with multi-policy
[J]. Computer Engineering and Applications, 2011, 47(7): 107-109.
|
| [8] |
WANG Yongfeng1,ZHANG Jianzhong2.
Notes about cryptanalysis of two group signature schemes
[J]. Computer Engineering and Applications, 2011, 47(33): 85-87.
|
| [9] |
MI Junli1,XIE Shucui2,ZHANG Jianzhong3.
Signcryption testament protocol based on quadratic residue
[J]. Computer Engineering and Applications, 2011, 47(27): 91-93.
|
| [10] |
WANG Yong-bing,WANG Ji-chuan.
Cryptanalysis of threshold group signature schemes with privilege subsets
[J]. Computer Engineering and Applications, 2010, 46(9): 80-82.
|
| [11] |
OU Hai-wen1,WANG Jia-li1,2.
New ID-based dynamic group signature scheme
[J]. Computer Engineering and Applications, 2010, 46(6): 96-97.
|
| [12] |
WANG Xiang .
Group signature scheme based on NTRUSign
[J]. Computer Engineering and Applications, 2010, 46(34): 99-101.
|
| [13] |
ZHANG Jian-zhong,WANG Yong-feng,ZHANG Yi-lin.
Security analysis of group signature scheme based on RSA
[J]. Computer Engineering and Applications, 2010, 46(22): 121-123.
|
| [14] |
LIU Xin1,2,XU Qiu-liang2.
Practical anonymous subscription protocol
[J]. Computer Engineering and Applications, 2009, 45(4): 93-97.
|
| [15] |
LIU Xin 1,2,XU Qiu-liang2,QIN Ran1.
Building practical anonymous fingerprinting scheme based on group signature
[J]. Computer Engineering and Applications, 2009, 45(24): 110-113.
|