Deep search:Searching for "Provable security" in 'KEYWORDGot 3 items.
index Title
1Low-computation certificateless hybrid signcryption scheme
Author(s):Hui-fang Yu, Bo Yang  Clicked:7449  Download:2739  Cited:0  <Full Text>  <PPT> 1940
Frontiers of Information Technology & Electronic Engineering  2017 Vol.18 No.7 P.928-940  DOI:10.1631/FITEE.1601054
2A leakage-resilient certificateless public key encryption scheme with CCA2 security
Author(s):Yan-wei Zhou, Bo Yang, Hao Cheng, ...  Clicked:6403  Download:2567  Cited:0  <Full Text>  <PPT> 1838
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.4 P.481-493  DOI:10.1631/FITEE.1601849
3Double-authentication-preventing signatures revisited: new definition and construction from chameleon hash
Author(s):Fei Li, Wei Gao, Gui-lin Wang, Ke-...  Clicked:7938  Download:2798  Cited:0  <Full Text>  <PPT> 1693
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.2 P.176-186  DOI:10.1631/FITEE.1700005
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2024 Journal of Zhejiang University-SCIENCE