Cryptology and Network Security
From MaRDI portal
Publication:5898113
DOI10.1007/11599371zbMath1154.94460OpenAlexW4376546205MaRDI QIDQ5898113
Zhenjie Huang, Yu-Min Wang, Ke-Fei Chen
Publication date: 14 November 2006
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11599371
Data encryption (aspects in computer science) (68P25) Authentication, digital signatures and secret sharing (94A62)
Related Items (5)
A Pairing-Less Identity-Based Blind Signature with Message Recovery Scheme for Cloud-Assisted Services ⋮ Provably secure pairing-free identity-based partially blind signature scheme and its application in online E-cash system ⋮ Identity-based partially blind signature in the standard model for electronic cash ⋮ One-Round ID-Based Blind Signature Scheme without ROS Assumption ⋮ Construction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures
This page was built for publication: Cryptology and Network Security