Author of the publication

Analysis and Improvement of a Proxy Blind Multi-signature Scheme without a Secure Channel.

, , , and . IAS, page 661-664. IEEE Computer Society, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improvements on k-error linear complexity of q-ary sequences derived from Euler quotients., , and . Cryptologia, 46 (2): 148-166 (2022)Medical Image Encryption Scheme Based on Arnold Transformation and ID-AK Protocol., , , , and . Int. J. Netw. Secur., 19 (5): 776-784 (2017)User-to-User Mutual Authentication and Key Agreement Scheme for LTE Cellular System., , , , , and . Int. J. Netw. Secur., 18 (4): 769-781 (2016)A new certificateless signature with enhanced security and aggregation version., , , and . Concurr. Comput. Pract. Exp., 28 (4): 1124-1133 (2016)云存储环境下支持策略变更的CP-ABE方案 (CP-ABE Scheme with Supporting Policy Elastic Updating in Cloud Storage Environment)., , and . 计算机科学, 43 (1): 191-194 (2016)Statistical learning based fully homomorphic encryption on encrypted data., , , and . Soft Comput., 21 (24): 7473-7483 (2017)Lattice-based searchable public-key encryption scheme for secure cloud storage., , , and . IJWGS, 14 (1): 3-20 (2018)New forward-secure signature schemes with untrusted update., , , , and . Frontiers Comput. Sci., 7 (4): 536-543 (2013)Edge-Cloud-Assisted Certificate Revocation Checking: An Efficient Solution Against Irresponsible Service Providers., , , , , and . IEEE Internet Things J., 10 (17): 15563-15580 (September 2023)Server-aided searchable encryption in multi-user setting., , , and . Comput. Commun., (2020)