Cited by 9
Analysis and Improvements of Two Identity-Based Perfect Concurrent Signature Schemes

2008 International Conference on Computational Intelligence and Security
JIang Han, Xu Qiuliang, Zhang Bo
Conference  (2008), p. 273
2008 The 9th International Conference for Young Computer Scientists
Zhenjie Huang, Xuanzhi Lin, Rufen Huang
Conference  (2008), p. 2102
2010 International Conference on Multimedia Information Networking and Security
Zhenjie Huang, Jianneng Chen
Conference  (2010), p. 526
2011 Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing
Chih-Hung Wang, Chao Chuan Chen
Conference  (2011), p. 514
2011 IEEE 2nd International Conference on Software Engineering and Service Science
Zhong Zhang, Shuo Xu
Conference  (2011), p. 453
Generalization of perfect concurrent signatures
Qing YE, Shi-hui ZHENG, Hong-fu GUO, Yi-xian YANG
Journal  The Journal of China Universities of Posts and Telecommunications Volume 19, Issue 6 (2012), p. 94
Multi-Party Concurrent Signature Scheme Based on Designated Verifiers
Jianni Xushuai, Zhihong Zhou, Wen Qin, Qiongxi Jiang, Nanrun Zhou
Journal  Journal of Computers Volume 8, Issue 11 (2013)
New concurrent digital signature scheme based on the computational Diffie-Hellman problem
Wen QIN, Nan-run ZHOU
Journal  The Journal of China Universities of Posts and Telecommunications Volume 17, Issue 6 (2010), p. 89
The Design of Concurrent Signature Combined with Blind Signature Generation and Its Application on E-commerce
Chien-Ming Wang, Chih-Hung Wang
Book  Smart Innovation, Systems and Technologies (2021 International Conference on Security and Information Technologies with AI, Internet Computing and Big-data Applications) Volume 314 (2023), p. 315