[1] |
.
A Threshold Public Key Encryption via Dual Regev Scheme
[J]. , 2020, 43(4): 83-87.
|
[2] |
ZHANG Jun-song, ZHANG Qi-kun, GAN Yong, MENG Ying-hui.
A New Authentication Protocol for Wireless Medical Sensor Network
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2018, 41(4): 104-109.
|
[3] |
ZHA Ya-xing, LUO Shou-shan, LI Wei, BIAN Jian-chao.
Dynamic Group Public Auditing Scheme for Shared Data on Attribute-Based Threshold Signature
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2017, 40(5): 43-49.
|
[4] |
XU Jian, YANG Geng, CHEN Zheng-yu, WANG Hai-yong, WANG Qian-qian.
Source Coding Based Recoverable Privacy-Preserving Data Aggregation Scheme
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2016, 39(6): 67-71.
|
[5] |
CHU Chun-yan, XIA Xu-jun, ZHANG Sheng-li.
Research on Continuous Variable Quantum Cryptography with Unbalanced Basis Choice
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2016, 39(2): 39-42.
|
[6] |
TANG Yong-li, WANG Fei-fei, YE Qing, YAN Xi-xi.
Improved Provably Secure Certificateless Signature Scheme
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2016, 39(1): 112-116.
|
[7] |
XIANG Xin-yin, LI Hui.
Lattice-Based Online/Offline Signature Scheme
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2015, 38(3): 117-120,134.
|
[8] |
LU Xiu-hua, WEN Qiao-yan, JIN Zheng-ping, WANG Li-cheng, YANG Chun-li.
Improvement of a Fuzzy Identity-Based Lattice Signature Scheme
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2015, 38(2): 55-58.
|
[9] |
LAI Qi-qi, HU Yu-pu, CHEN Yuan, WANG Bao-cang, JIANG Ming-ming.
Construction of Auxiliary-Input Secure Lossy Trapdoor Functions
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2014, 37(6): 6-10.
|
[10] |
NONG Qiang, HUANG Ru-fen, HUANG Zhen-jie.
Improved for Certificate-Based Signature Scheme
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2014, 37(3): 48-52.
|
[11] |
JIANG Ming-ming, HU Yu-pu, WANG Bao-cang, WANG Feng-he, LAI Qi-qi.
Efficient Proxy Signature over Lattices
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2014, 37(3): 89-92.
|
[12] |
WANG Tao-chun, QIN Xiao-lin, LIU Liang, DAI Hua.
Privacy-Preserving Range Query in Two-Tiered Wireless Sensor Networks
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2014, 37(2): 104-108.
|
[13] |
ZHOU Cai-xue.
Cryptanalysis and Improvement of Certificate-Based Signature Scheme
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2013, 36(6): 98-101.
|
[14] |
ZHANG Jun, WU Ji-yi.
Provable Secure Efficient Arbitrated Quantum Signature Scheme
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2013, 36(2): 113-116.
|
[15] |
ZHAO Chen, SUN Bin, YANG Yi-xian, YANG Yan.
An Improved BGP Security Mechanism
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2012, 35(6): 87-91.
|