APA (7th ed.) Citation

Ren, Y., Cai, J., Huang, C., & Gu, D. (2015). Verifiable outsourcing private key generation algorithm in an identity-based encryption scheme. Tongxin Xuebao, 36(11), 2015233-2015236. https://doi.org/10.11959/j.issn.1000-436x.2015233

Chicago Style (17th ed.) Citation

Ren, Yan-Li, Jian-Xing Cai, Chun-Shui Huang, and Da-Wu Gu. "Verifiable Outsourcing Private Key Generation Algorithm in an Identity-based Encryption Scheme." Tongxin Xuebao 36, no. 11 (2015): 2015233-2015236. https://doi.org/10.11959/j.issn.1000-436x.2015233.

MLA (9th ed.) Citation

Ren, Yan-Li, et al. "Verifiable Outsourcing Private Key Generation Algorithm in an Identity-based Encryption Scheme." Tongxin Xuebao, vol. 36, no. 11, 2015, pp. 2015233-2015236, https://doi.org/10.11959/j.issn.1000-436x.2015233.

Warning: These citations may not always be 100% accurate.