UM

Browse/Search Results:  1-7 of 7 Help

Selected(0)Clear Items/Page:    Sort:
Secure and efficient multi-proxy signature scheme in the standard model Journal article
Gu K., Jia W., Deng Y., Nie X.. Secure and efficient multi-proxy signature scheme in the standard model[J]. Chinese Journal of Electronics, 2016, 25(1), 93-99.
Authors:  Gu K.;  Jia W.;  Deng Y.;  Nie X.
Favorite | TC[WOS]:4 TC[Scopus]:4 | Submit date:2019/02/11
Computational Diffie-hellman (Cdh) Assumption  Efficiency  Multi-proxy Signature  Provable Security  
Secure and efficient proxy signature scheme in the standard model Journal article
Gu K., Jia W., Chen R., Liu X.. Secure and efficient proxy signature scheme in the standard model[J]. Chinese Journal of Electronics, 2013, 22(4), 666-670.
Authors:  Gu K.;  Jia W.;  Chen R.;  Liu X.
Favorite |  | Submit date:2019/02/11
Computational diffle-hellman (cdh) assumption  Efficiency  Provable security  Proxy signature  Security model  
Identity-based group proxy signature scheme in the standard model Journal article
Gu K., Jia W., Li C., Chen R.. Identity-based group proxy signature scheme in the standard model[J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2013, 50(7), 1370-1386.
Authors:  Gu K.;  Jia W.;  Li C.;  Chen R.
Favorite |  | Submit date:2019/02/11
CDH problem  Group proxy signature  Identity  Provable security  Security model  
Proxy signature in the standard model: constructing security model and proving security Journal article
Gu K., Jia W.-J., Wang S.-C., Shi L.-W.. Proxy signature in the standard model: constructing security model and proving security[J]. Ruan Jian Xue Bao/Journal of Software, 2012, 23(9), 2416-2429.
Authors:  Gu K.;  Jia W.-J.;  Wang S.-C.;  Shi L.-W.
Favorite | TC[Scopus]:2 | Submit date:2019/02/11
Cdhp  Identity  Provable Security  Proxy Signature  
A group proxy signature scheme based on sub-secret evolution Journal article
Gu K., Jia W., Jiang C.. A group proxy signature scheme based on sub-secret evolution[J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2012, 49(5), 962-973.
Authors:  Gu K.;  Jia W.;  Jiang C.
Favorite |  | Submit date:2019/02/11
CDHP  Cellular automata  Provable security  Proxy signature  Sub-secret evolution  
An anonymous wireless authentication protocol based on proxy signature Journal article
Jiang C., Jia W., Gu K.. An anonymous wireless authentication protocol based on proxy signature[J]. Journal of Computational Information Systems, 2012, 8(2), 541-548.
Authors:  Jiang C.;  Jia W.;  Gu K.
Favorite |  | Submit date:2019/02/11
Anonymity  Authentication  Key exchange  Proxy signature  
A group proxy signature scheme based on key matrix Journal article
Gu K., Jia W.-J., Jiang C.-L.. A group proxy signature scheme based on key matrix[J]. Sichuan Daxue Xuebao (Gongcheng Kexue Ban)/Journal of Sichuan University (Engineering Science Edition), 2011, 43(4), 108-115.
Authors:  Gu K.;  Jia W.-J.;  Jiang C.-L.
Favorite |  | Submit date:2019/02/11
Bilinear transformation  CDHP  Key matrix  Proxy signature