相关期刊:《Communications in Theoretical Physics》《Frontiers of Computer Science》《Wuhan University Journal of Natural Sciences》《Chinese Journal of Electronics》更多>>
supported by the National Natural Science Foundation of China(No.U1636213,No.61370063);Beijing Municipal Natural Science Foundation(No.4172053);Natural Science Foundation of Henan(No.162300410322)
Proxy signature plays an important role in distributed systems, mobile agent applications, distributed shared object systems, global distribution networks and mobile communications etc., since it allows the original s...
supported in part by the National Natural Science Foundation of China(No.61262057,No.61063041,No.61163038);the Young Teachers’Scientific Research Ability Promotion Program of Northwest Normal University(No.NWNU-LKQN-10-22)
To improve the performance of threshold proxy re-signatures, the notion of on-line/off-line threshold proxy re-signatures is introduced. The bulk of re-signature computation can be done in the off-line phase before th...
This work is supported by the National Natural Science Foundation of China (No.60772136, No.61003300), 863 Hi-Tech Research and Development Program of China (No.2007AA01Z435), National Key Technology R&D Program of China during the 9th Five-Year Plan Period (No.2008BAH22B03, No.2007BAH08B01), National 111 Program (No.B08038) and Fundamental Research Funds for the Central Universities 'No.JY10000901021).
Identity based signcryption Key encapsulation mechanism (KEM) is used to encapsulate a symmetric key during the construction of hybrid signcryption in the identity based setting. We introduce the notion of Identity ...