您当前的位置:
首页 >
文章列表页 >
ID-based efficient and proactive threshold proxy signature in the standard model
更新时间:2024-10-14
    • ID-based efficient and proactive threshold proxy signature in the standard model

    • Vol. 32, Issue 8, Pages: 55-63(2011)
    • CLC: TN918.1
    • Published:2011

    移动端阅览

  • YU Yi-ke1, ZHENG Xue-feng2. ID-based efficient and proactive threshold proxy signature in the standard model[J]. 2011, 32(8): 55-63. DOI:

  •  
  •  
icon
试读结束,您可以激活您的VIP账号继续阅读。
去激活 >
icon
试读结束,您可以通过登录账户,到个人中心,购买VIP会员阅读全文。
已是VIP会员?
去登录 >

0

Views

905

下载量

10

CSCD

Alert me when the article has been cited
提交
Tools
Download
Export Citation
Share
Add to favorites
Add to my album

Related Articles

Identity-based ring signature scheme under standard model
Linearly homomorphic aggregate signature secure in the standard model
ID-based ring signature on prime order group from asymmetric pairing
Identity-based incremental signature scheme from lattices
Revocable identity-based proxy re-signature scheme in the standard model

Related Author

ZHANG Yue-yu
LI Hui
WANG Yu-min
HAN Yiliang
LI Ruifeng
ZHOU Tanping
WANG Jingjing
YANG Xiaoyuan

Related Institution

西安电子科技大学计算机网络与信息安全教育部重点实验室
Ministry of Edu.Key Lab. of Computer Network and Information Security,Xidian Univ.
Key Laboratory of Counter-Terrorism Command & Information Engineering of Ministry of Education, Engineering University of PAP
Key Lab of the Armed Police Force for Network and Information Security
School of Cryptography and Engineering, Engineering University of PAP
0