Deep search:Searching for "standard model" in 'ABSTRACTGot 5 items.
index Title
1Non-interactive identity-based threshold signature scheme without random oracles
Author(s):Xun SUN, Jian-hua LI, Shu-tang YAN...  Clicked:6580  Download:3565  Cited:4  <Full Text>
Journal of Zhejiang University Science A  2008 Vol.9 No.6 P.727-736  DOI:10.1631/jzus.A0720028
2Towards a self-adaptive service-oriented methodology based on extended SOMA
Author(s):Alireza Parvizi-Mosaed, Shahrouz M...  Clicked:9503  Download:3393  Cited:2  <Full Text>  <PPT> 2540
Frontiers of Information Technology & Electronic Engineering  2015 Vol.16 No.1 P.43-69  DOI:10.1631/FITEE.1400040
3Efficient hierarchical identity based encryption scheme in the standard model over lattices
Author(s):Feng-he Wang, Chun-xiao Wang, Zhen...  Clicked:7329  Download:2983  Cited:0  <Full Text>  <PPT> 2008
Frontiers of Information Technology & Electronic Engineering  2016 Vol.17 No.8 P.781-791  DOI:10.1631/FITEE.1500219
4Identity-based threshold proxy re-encryption scheme from lattices and its applications
Author(s):Liqiang WU, Yiliang HAN, Xiaoyuan ...  Clicked:7621  Download:11260  Cited:0  <Full Text>  <PPT> 857
Frontiers of Information Technology & Electronic Engineering  2022 Vol.23 No.2 P.258-277  DOI:10.1631/FITEE.2000366
5Post-quantum blind signcryption scheme from lattice
Author(s):Huifang Yu, Lu Bai  Clicked:5635  Download:8140  Cited:0  <Full Text>  <PPT> 1597
Frontiers of Information Technology & Electronic Engineering  2021 Vol.22 No.6 P.891-901  DOI:10.1631/FITEE.2000099
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2025 Journal of Zhejiang University-SCIENCE