Author of the publication

A Separable Threshold Ring Signature Scheme.

, , and . ICISC, volume 2971 of Lecture Notes in Computer Science, page 12-26. Springer, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Blind Spontaneous Anonymous Group Signatures for Ad Hoc Groups., , , and . ESAS, volume 3313 of Lecture Notes in Computer Science, page 82-94. Springer, (2004)Tight Reductions among Strong Di e-Hellman Assumptions.. IACR Cryptology ePrint Archive, (2005)Fast and Proven Secure Blind Identity-Based Signcryption from Pairings., and . IACR Cryptology ePrint Archive, (2004)(Hierarchical Identity-Based) Threshold Ring Signatures., and . IACR Cryptology ePrint Archive, (2006)Ring Signatures without Random Oracles., , , and . IACR Cryptology ePrint Archive, (2005)Linkable Spontaneous Anonymous Group Signature for Ad Hoc Groups., , and . IACR Cryptology ePrint Archive, (2004)Teaching for Conceptual Change in Security Awareness., and . IEEE Secur. Priv., 6 (6): 67-69 (2008)On the constructions of highly nonlinear zigzag functions and unbiased functions., , and . Inf. Process. Lett., 79 (3): 135-140 (2001)elf-Complementary Balanced Codes and Quasi-Symmetric Designs., and . Des. Codes Cryptogr., 27 (3): 271-279 (2002)On the Svanström bound for ternary constant-weight codes., , , and . IEEE Trans. Inf. Theory, 47 (5): 2061-2064 (2001)