Author:
Hafizul Islam SK,Sabzinejad Farash Mohammad,Biswas G.P.,Khurram Khan Muhammad,Obaidat Mohammad S.
Subject
Applied Mathematics,Computational Theory and Mathematics,Computer Science Applications
Reference46 articles.
1. S. Al-Riyami and K. Paterson,Certificateless Public Key Cryptography, Proceedings of the Advance in Cryptologyn (Asiacrypt'03), LNCS 2894, Springer-Verlag, Taipei, Taiwan, 2003, pp. 452–473.
2. M. Ballare and P. Rogaway,Random Oracles Are Practical: A Paradigm for Designing Efficient Protocols, Proceedings of the 1st ACM Conference on Computer and Communications Security (CCS'93), Fairfax, VA, USA, 1993, pp. 62–73.
3. W. Biao, Y. Xiaodong and Y. Guang,An Identity-Based Multisignature Scheme from the Weil Pairing, Proceedings of the International Conference on Computer Design And Applications Vol. 5, Qinhuangdao, China, 2010, pp. 585–587.
4. D. Boneh and M.K. Franklin:Identity-based Encryption from the Weil Pairing, Proceedings of the Advances in Cryptology (Crypto'01), LNCS 2139, Springer-Verlag, Santa Barbara, California, USA, 2001, pp. 213–229.
5. A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges
Cited by
16 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献