The anonymous communication systems usually have special traffic patterns,which can be detected by censors for further disturbing or blocking.To solve this prob
This paper analyzes the efficiency and security of bilinear-map-based schemes and brings about an AAA based publicly auditable scheme for cloud computing,which
With the development of quantum computer,multivariate public key cryptography withstanding quantum attack has became one of the research focus.The existed signc
Identity-based key agreement protocol affords a natural way to combine the participant’s identity with its public key.However,most of them just consider the ke