UM

Browse/Search Results:  1-4 of 4 Help

Selected(0)Clear Items/Page:    Sort:
Proxy signature in the standard model: constructing security model and proving security Journal article
Gu K., Jia W.-J., Wang S.-C., Shi L.-W.. Proxy signature in the standard model: constructing security model and proving security[J]. Ruan Jian Xue Bao/Journal of Software, 2012, 23(9), 2416-2429.
Authors:  Gu K.;  Jia W.-J.;  Wang S.-C.;  Shi L.-W.
Favorite | TC[Scopus]:2 | Submit date:2019/02/11
Cdhp  Identity  Provable Security  Proxy Signature  
A group proxy signature scheme based on sub-secret evolution Journal article
Gu K., Jia W., Jiang C.. A group proxy signature scheme based on sub-secret evolution[J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2012, 49(5), 962-973.
Authors:  Gu K.;  Jia W.;  Jiang C.
Favorite |  | Submit date:2019/02/11
CDHP  Cellular automata  Provable security  Proxy signature  Sub-secret evolution  
A group proxy signature scheme based on key matrix Journal article
Gu K., Jia W.-J., Jiang C.-L.. A group proxy signature scheme based on key matrix[J]. Sichuan Daxue Xuebao (Gongcheng Kexue Ban)/Journal of Sichuan University (Engineering Science Edition), 2011, 43(4), 108-115.
Authors:  Gu K.;  Jia W.-J.;  Jiang C.-L.
Favorite |  | Submit date:2019/02/11
Bilinear transformation  CDHP  Key matrix  Proxy signature  
Efficient and secure identity-based signature scheme Journal article
Gu K., Jia W.-J., Jiang C.-L.. Efficient and secure identity-based signature scheme[J]. Ruan Jian Xue Bao/Journal of Software, 2011, 22(6), 1350-1360.
Authors:  Gu K.;  Jia W.-J.;  Jiang C.-L.
Favorite | TC[Scopus]:7 | Submit date:2019/02/11
Cdhp  Computational Efficiency  Provable Security  Signature  Standard Model