[1] |
YE Qing, YANG Xiaomeng, QIN Panke, ZHAO Zongqu, TANG Yongli.
Novel Against Quantum Attacks Group Signature Scheme Based on NTRU Lattice
[J]. Computer Engineering and Applications, 2020, 56(2): 89-96.
|
[2] |
WANG Shuo1, CHENG Xiangguo1, CHEN Yameng2, WANG Yue1.
ID-based key-insulated group signature scheme
[J]. Computer Engineering and Applications, 2018, 54(16): 76-80.
|
[3] |
LIU Xin1,2,3.
Member ID-based group signature with online extractors
[J]. Computer Engineering and Applications, 2013, 49(2): 113-118.
|
[4] |
ZHANG Kai, ZHANG Jianzhong.
Analysis and improvement of a group signature scheme
[J]. Computer Engineering and Applications, 2013, 49(19): 75-78.
|
[5] |
LI Haifeng1, LAN Caihui2, ZUO Weiping1, MA Haiyun1.
ID-based threshold group signature scheme without trusted party
[J]. Computer Engineering and Applications, 2012, 48(32): 89-93.
|
[6] |
YANG Changhai.
Cryptanalysis of threshold group signature scheme with multi-policy
[J]. Computer Engineering and Applications, 2011, 47(7): 107-109.
|
[7] |
WANG Yongfeng1,ZHANG Jianzhong2.
Notes about cryptanalysis of two group signature schemes
[J]. Computer Engineering and Applications, 2011, 47(33): 85-87.
|
[8] |
MI Junli1,XIE Shucui2,ZHANG Jianzhong3.
Signcryption testament protocol based on quadratic residue
[J]. Computer Engineering and Applications, 2011, 47(27): 91-93.
|
[9] |
ZHANG Haixin,CHENG Lihong,LI Shundong.
Applied research of group signature for privacy protection in DRM system
[J]. Computer Engineering and Applications, 2011, 47(15): 108-111.
|
[10] |
WANG Yong-bing,WANG Ji-chuan.
Cryptanalysis of threshold group signature schemes with privilege subsets
[J]. Computer Engineering and Applications, 2010, 46(9): 80-82.
|
[11] |
OU Hai-wen1,WANG Jia-li1,2.
New ID-based dynamic group signature scheme
[J]. Computer Engineering and Applications, 2010, 46(6): 96-97.
|
[12] |
WANG Xiang .
Group signature scheme based on NTRUSign
[J]. Computer Engineering and Applications, 2010, 46(34): 99-101.
|
[13] |
ZHANG Jian-zhong,WANG Yong-feng,ZHANG Yi-lin.
Security analysis of group signature scheme based on RSA
[J]. Computer Engineering and Applications, 2010, 46(22): 121-123.
|
[14] |
LIU Xin1,2,XU Qiu-liang2.
Practical anonymous subscription protocol
[J]. Computer Engineering and Applications, 2009, 45(4): 93-97.
|
[15] |
LIU Xin 1,2,XU Qiu-liang2,QIN Ran1.
Building practical anonymous fingerprinting scheme based on group signature
[J]. Computer Engineering and Applications, 2009, 45(24): 110-113.
|