Author:
Li Jiguo,Huang Xinyi,Hong Meixue,Zhang Yichen
Funder
National Natural Science Foundation of China
Fundamental Research Funds for the Central Universities
China Postdoctoral Science Foundation
Jiangsu Province of China
Key Lab of Fujian Province University Network Security and Cryptology
Program for New Century Excellent Talents in Hohai University
Subject
Computational Mathematics,Computational Theory and Mathematics,Modelling and Simulation
Reference42 articles.
1. Certificate-based encryption and the certificate revocation problem;Gentry,2003
2. Identity-based cryptosystems and signature schemes;Shamir,1985
3. Certificateless public key cryptography;Al-Riyami,2003
4. Improved certificate-based encryption in the standard model;Galindo;Journal of Systems and Software,2008
5. A certificate-based signature scheme;Kang,2004
Cited by
25 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献