Cited by 9
Analysis and Improvements of Two Identity-Based Perfect Concurrent Signature Schemes

2008 The 9th International Conference for Young Computer Scientists
Zhenjie Huang, Xuanzhi Lin, Rufen Huang
Conference:  (2008), p. 2102
2010 International Conference on Multimedia Information Networking and Security
Zhenjie Huang, Jianneng Chen
Conference:  (2010), p. 526
2011 IEEE 2nd International Conference on Software Engineering and Service Science
Zhong Zhang, Shuo Xu
Conference:  (2011), p. 453
The Design of Concurrent Signature Combined with Blind Signature Generation and Its Application on E-commerce
Chien-Ming Wang, Chih-Hung Wang
Book:  Smart Innovation, Systems and Technologies (2021 International Conference on Security and Information Technologies with AI, Internet Computing and Big-data Applications) Volume 314 (2023), p. 315
2011 Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing
Chih-Hung Wang, Chao Chuan Chen
Conference:  (2011), p. 514
2008 International Conference on Computational Intelligence and Security
JIang Han, Xu Qiuliang, Zhang Bo
Conference:  (2008), p. 273
Generalization of perfect concurrent signatures
Qing YE, Shi-hui ZHENG, Hong-fu GUO, Yi-xian YANG
Journal:  The Journal of China Universities of Posts and Telecommunications Volume 19, Issue 6 (2012), p. 94
Multi-Party Concurrent Signature Scheme Based on Designated Verifiers
Jianni Xushuai, Zhihong Zhou, Wen Qin, Qiongxi Jiang, Nanrun Zhou
Journal:  Journal of Computers Volume 8, Issue 11 (2013)
New concurrent digital signature scheme based on the computational Diffie-Hellman problem
Wen QIN, Nan-run ZHOU
Journal:  The Journal of China Universities of Posts and Telecommunications Volume 17, Issue 6 (2010), p. 89