UM

Browse/Search Results:  1-6 of 6 Help

Selected(0)Clear Items/Page:    Sort:
Secure and efficient multi-proxy signature scheme in the standard model Journal article
Gu K., Jia W., Deng Y., Nie X.. Secure and efficient multi-proxy signature scheme in the standard model[J]. Chinese Journal of Electronics, 2016, 25(1), 93-99.
Authors:  Gu K.;  Jia W.;  Deng Y.;  Nie X.
Favorite | TC[WOS]:4 TC[Scopus]:4 | Submit date:2019/02/11
Computational Diffie-hellman (Cdh) Assumption  Efficiency  Multi-proxy Signature  Provable Security  
Secure and efficient proxy signature scheme in the standard model Journal article
Gu K., Jia W., Chen R., Liu X.. Secure and efficient proxy signature scheme in the standard model[J]. Chinese Journal of Electronics, 2013, 22(4), 666-670.
Authors:  Gu K.;  Jia W.;  Chen R.;  Liu X.
Favorite |  | Submit date:2019/02/11
Computational diffle-hellman (cdh) assumption  Efficiency  Provable security  Proxy signature  Security model  
Identity-based group proxy signature scheme in the standard model Journal article
Gu K., Jia W., Li C., Chen R.. Identity-based group proxy signature scheme in the standard model[J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2013, 50(7), 1370-1386.
Authors:  Gu K.;  Jia W.;  Li C.;  Chen R.
Favorite |  | Submit date:2019/02/11
CDH problem  Group proxy signature  Identity  Provable security  Security model  
Proxy signature in the standard model: constructing security model and proving security Journal article
Gu K., Jia W.-J., Wang S.-C., Shi L.-W.. Proxy signature in the standard model: constructing security model and proving security[J]. Ruan Jian Xue Bao/Journal of Software, 2012, 23(9), 2416-2429.
Authors:  Gu K.;  Jia W.-J.;  Wang S.-C.;  Shi L.-W.
Favorite | TC[Scopus]:2 | Submit date:2019/02/11
Cdhp  Identity  Provable Security  Proxy Signature  
A group proxy signature scheme based on sub-secret evolution Journal article
Gu K., Jia W., Jiang C.. A group proxy signature scheme based on sub-secret evolution[J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2012, 49(5), 962-973.
Authors:  Gu K.;  Jia W.;  Jiang C.
Favorite |  | Submit date:2019/02/11
CDHP  Cellular automata  Provable security  Proxy signature  Sub-secret evolution  
Efficient and secure identity-based signature scheme Journal article
Gu K., Jia W.-J., Jiang C.-L.. Efficient and secure identity-based signature scheme[J]. Ruan Jian Xue Bao/Journal of Software, 2011, 22(6), 1350-1360.
Authors:  Gu K.;  Jia W.-J.;  Jiang C.-L.
Favorite | TC[Scopus]:7 | Submit date:2019/02/11
Cdhp  Computational Efficiency  Provable Security  Signature  Standard Model