scientific article; zbMATH DE number 6831439
From MaRDI portal
Publication:3131966
DOI10.6040/J.ISSN.1671-9352.2.2016.215zbMATH Open1389.68025MaRDI QIDQ3131966FDOQ3131966
Authors: Peng Luo, Xiaoyuan Yang
Publication date: 29 January 2018
Title of this publication is not available (Why is that?)
Recommendations
- On the Security of Identity Based Ring Signcryption Schemes
- Identity based ring signcryption schemes revisited
- A certificateless ring signature scheme and an ID-based multisignature scheme
- Identity-based ring signatures from RSA
- Identity Based Ring Signature: Why, How and What Next
- Information and Communications Security
- Ring-based identity based encryption -- asymptotically shorter MPK and tighter security
Data encryption (aspects in computer science) (68P25) Cryptography (94A60) Authentication, digital signatures and secret sharing (94A62)
Cited In (1)
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3131966)