[1] |
Yiting WANG, Wunan WAN, Shibin ZHANG, Jinquan ZHANG, Zhi QIN.
Linkable ring signature scheme based on SM9 algorithm
[J]. Journal of Computer Applications, 2024, 44(12): 3709-3716.
|
[2] |
Xiuping ZHU, Yali LIU, Changlu LIN, Tao LI, Yongquan DONG.
Efficient certificateless ring signature scheme based on elliptic curve
[J]. Journal of Computer Applications, 2023, 43(11): 3368-3374.
|
[3] |
ZHAO Hong, YU Shuhan, HAN Yanyan, LI Zhaobin.
Analysis and improvement of certificateless signature scheme
[J]. Journal of Computer Applications, 2023, 43(1): 147-153.
|
[4] |
NONG Qiang, ZHANG Bangbang, OUYANG Yuhao.
Lattice-based hierarchical certificateless proxy signature scheme
[J]. Journal of Computer Applications, 2023, 43(1): 154-159.
|
[5] |
Yangnan GUO, Wenbao JIANG, Shuai YE.
Supervisable blockchain anonymous transaction system model
[J]. Journal of Computer Applications, 2022, 42(9): 2757-2764.
|
[6] |
Suqing LIN, Shuhua ZHANG.
Attribute-based encryption scheme with verifiable search and non-monotonic access structure
[J]. Journal of Computer Applications, 2022, 42(9): 2772-2779.
|
[7] |
Dong ZHU, Xinchun YIN, Jianting NING.
Certificateless signature scheme with strong privacy protection for internet of vehicles
[J]. Journal of Computer Applications, 2022, 42(10): 3091-3101.
|
[8] |
CAO Zhenhuan, GU Xiaozhuo, GU Menghe.
Certificateless authentication group key agreement protocol for Ad Hoc networks
[J]. Journal of Computer Applications, 2019, 39(2): 476-482.
|
[9] |
ZUO Liming, HU Kaiyu, ZHANG Mengli, CHEN Lanlan.
Data transmission protocol based on short signature scheme for railway bridge monitoring
[J]. Journal of Computer Applications, 2018, 38(8): 2261-2266.
|
[10] |
SU Jingfeng, LIU Juxia.
Efficient certificateless aggregate signcryption scheme without bilinear pairings
[J]. Journal of Computer Applications, 2018, 38(2): 374-378.
|
[11] |
XU Hailin, LU Yang.
Efficient bilinear-pairing-free certificate-based encryption scheme with keyword search
[J]. Journal of Computer Applications, 2018, 38(2): 379-385.
|
[12] |
ZUO Liming, CHEN Zuosong, XIA Pingping, YI Chuanjia.
Efficient and provably secure short proxy signature scheme
[J]. Journal of Computer Applications, 2018, 38(12): 3455-3461.
|
[13] |
RONG Xing, ZHAO Yong.
Trustworthiness attestation scheme for virtual machine based on certificateless ring signature
[J]. Journal of Computer Applications, 2017, 37(2): 378-382.
|
[14] |
LIU Jianhua, MAO Kefei, HU Junwei.
Certificateless aggregate signcryption scheme based on bilinear pairings
[J]. Journal of Computer Applications, 2016, 36(6): 1558-1562.
|
[15] |
XU Hailin, CHEN Ying, LU Yang.
Efficient certificate-based proxy re-encryption scheme without bilinear pairings
[J]. Journal of Computer Applications, 2016, 36(5): 1250-1256.
|