| 1. | Two efficient hierarchical identity based signature schemes 一种基于身份的群签名方案 |
| 2. | Ideal functionality for identity - based encryption schemes 基于身份的公钥加密的理想功能 |
| 3. | Robust id - based threshold signcryption scheme from pairings 基于身份的强壮门限签密方案 |
| 4. | A survey of identity - based cryptography using pairing 使用对技术的基于身份密码学研究综述 |
| 5. | Id - based blind signature schemes design 基于身份的盲签名方案设计 |
| 6. | Secure electronic auction schemes based on the short group signature 在层次结构下实现基于身份的签密 |
| 7. | A broadcast encryption scheme using hierarchical identity - based encryption 一种基于身份分层结构加密算法的广播加密方案 |
| 8. | Identity - based cryptography applied in wireless local network security protocol 基于身份密码体制在无线局域网安全协议中的应用 |
| 9. | Information technology - security techniques - digital signatures with appendix - part 2 : identity - based mechanisms 信息技术安全技术带附录的数字签名第2部分:基于身份的机制 |
| 10. | 16 bellare m , desai a , pointcheval d , rogaway p . relations among notations of security for public key encryption schemes 因此,有必要在基于身份的环境中设计出安全且高效的多解密者短密文加密方案。 |