Deep search:Searching for "standard model" in 'ABSTRACT and KEYWORDGot 5 items.
index Title
1Non-interactive identity-based threshold signature scheme without random oracles
Author(s):Xun SUN, Jian-hua LI, Shu-tang YAN...  Clicked:5908  Download:3234  Cited:4  <Full Text>
Journal of Zhejiang University Science A  2008 Vol.9 No.6 P.727-736  DOI:10.1631/jzus.A0720028
2Towards a self-adaptive service-oriented methodology based on extended SOMA
Author(s):Alireza Parvizi-Mosaed, Shahrouz M...  Clicked:8324  Download:2849  Cited:2  <Full Text>  <PPT> 2123
Frontiers of Information Technology & Electronic Engineering  2015 Vol.16 No.1 P.43-69  DOI:10.1631/FITEE.1400040
3Efficient hierarchical identity based encryption scheme in the standard model over lattices
Author(s):Feng-he Wang, Chun-xiao Wang, Zhen...  Clicked:6156  Download:2490  Cited:0  <Full Text>  <PPT> 1738
Frontiers of Information Technology & Electronic Engineering  2016 Vol.17 No.8 P.781-791  DOI:10.1631/FITEE.1500219
4Identity-based threshold proxy re-encryption scheme from lattices and its applications
Author(s):Liqiang WU, Yiliang HAN, Xiaoyuan ...  Clicked:6115  Download:8201  Cited:0  <Full Text>  <PPT> 539
Frontiers of Information Technology & Electronic Engineering  2022 Vol.23 No.2 P.258-277  DOI:10.1631/FITEE.2000366
5Post-quantum blind signcryption scheme from lattice
Author(s):Huifang Yu, Lu Bai  Clicked:4337  Download:5540  Cited:0  <Full Text>  <PPT> 1357
Frontiers of Information Technology & Electronic Engineering  2021 Vol.22 No.6 P.891-901  DOI:10.1631/FITEE.2000099
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2024 Journal of Zhejiang University-SCIENCE