UM

Browse/Search Results:  1-3 of 3 Help

Selected(0)Clear Items/Page:    Sort:
Secure and efficient proxy signature scheme in the standard model Journal article
Gu K., Jia W., Chen R., Liu X.. Secure and efficient proxy signature scheme in the standard model[J]. Chinese Journal of Electronics, 2013, 22(4), 666-670.
Authors:  Gu K.;  Jia W.;  Chen R.;  Liu X.
Favorite |  | Submit date:2019/02/11
Computational diffle-hellman (cdh) assumption  Efficiency  Provable security  Proxy signature  Security model  
Identity-based group proxy signature scheme in the standard model Journal article
Gu K., Jia W., Li C., Chen R.. Identity-based group proxy signature scheme in the standard model[J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2013, 50(7), 1370-1386.
Authors:  Gu K.;  Jia W.;  Li C.;  Chen R.
Favorite |  | Submit date:2019/02/11
CDH problem  Group proxy signature  Identity  Provable security  Security model  
Efficient and secure identity-based signature scheme Journal article
Gu K., Jia W.-J., Jiang C.-L.. Efficient and secure identity-based signature scheme[J]. Ruan Jian Xue Bao/Journal of Software, 2011, 22(6), 1350-1360.
Authors:  Gu K.;  Jia W.-J.;  Jiang C.-L.
Favorite | TC[Scopus]:7 | Submit date:2019/02/11
Cdhp  Computational Efficiency  Provable Security  Signature  Standard Model