Deep search:Searching for "Provable security" in 'KEYWORDGot 3 items.
index Title
1Low-computation certificateless hybrid signcryption scheme
Author(s):Hui-fang Yu, Bo Yang  Clicked:7245  Download:2657  Cited:0  <Full Text>  <PPT> 1886
Frontiers of Information Technology & Electronic Engineering  2017 Vol.18 No.7 P.928-940  DOI:10.1631/FITEE.1601054
2A leakage-resilient certificateless public key encryption scheme with CCA2 security
Author(s):Yan-wei Zhou, Bo Yang, Hao Cheng, ...  Clicked:6225  Download:2506  Cited:0  <Full Text>  <PPT> 1797
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.4 P.481-493  DOI:10.1631/FITEE.1601849
3Double-authentication-preventing signatures revisited: new definition and construction from chameleon hash
Author(s):Fei Li, Wei Gao, Gui-lin Wang, Ke-...  Clicked:7762  Download:2711  Cited:0  <Full Text>  <PPT> 1632
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.2 P.176-186  DOI:10.1631/FITEE.1700005
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2024 Journal of Zhejiang University-SCIENCE