搜索结果: 1-3 共查到“军事学 ID-based Threshold”相关记录3条 . 查询时间(0.087 秒)
An Efficient and Provably Secure ID-Based Threshold Signcryption Scheme
Threshold Signcryption Scheme Bilinear Diffie-Hellman assumption random oracle model
font style='font-size:12px;'>
2009/6/4
Signcryption is a cryptographic primitive that performs
digital signature and public key encryption simultaneously,
at a lower computational costs and communication overheads
than the signature-the...
A Suite of ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity
ID-Based Cryptography Ring Signature Anonymity Linkability
font style='font-size:12px;'>
2009/3/5
Since the introduction of Identity-based (ID-based) cryptography
by Shamir in 1984, numerous ID-based signature schemes have
been proposed. In 2001, Rivest et al. introduced ring signature that prov...
Efficient ID-based Threshold Signature Schemes without Pairings
ID-based Threshold Signature Schemes Pairings
font style='font-size:12px;'>
2008/12/17
The focus of this paper is to design an efficient and secure so-
lution addressing the key escrow problem in ID-based signature schemes,
i.e., the Private Key Generator (PKG) knows the user's priva...