Proxy signcryption scheme in the standard model

Y Ming, Y Wang - Security and Communication Networks, 2015 - Wiley Online Library
Proxy signcryption is a novel cryptographic primitive that combines the functionality of a
proxy signature with that of a signcryption. However, the security of all the known proxy …

A post-quantum communication secure identity-based proxy-signcryption scheme

X Zhang, C Xu, C Jin, J Wen - International Journal of …, 2015 - inderscienceonline.com
Proxy-signcryption is a variation of an ordinary signcryption scheme and has been used in
many applications where the delegation of rights is quite common. In a proxy-signcryption …

一种基于无双线性对映射的无证书代理签密方案

查文刚 - 华东交通大学学报, 2015 - cqvip.com
无证书签密是公钥密码体制的一个重要应用, 与传统的先签名后加密相比,
其计算量和通信成本都要低. 借鉴国密SM2 标准签名方案设计技巧, 提出了一个新的基于无双 …

Pairwise structural role mining for user categorization in information cascades

S Choobdar, P Ribeiro, F Silva - Proceedings of the 2015 IEEE/ACM …, 2015 - dl.acm.org
It is well known that many social networks follow the homophily principle, dictating that
individuals tend to connect with similar peers. Past studies focused on non-topological …