From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Encryption Schemes with Post-Challenge Auxiliary Inputs., , и . IACR Cryptology ePrint Archive, (2013)Signcryption in Hierarchical Identity Based Cryptosystem., , , и . IACR Cryptology ePrint Archive, (2004)Ring signatures without random oracles., , , и . AsiaCCS, стр. 297-302. ACM, (2006)How to construct identity-based signatures without the key escrow problem., , и . Int. J. Inf. Sec., 9 (4): 297-311 (2010)RingCT 3.0 for Blockchain Confidential Transaction: Shorter Size and Stronger Security., , , , , , и . IACR Cryptol. ePrint Arch., (2019)Compact Zero-Knowledge Proofs for Threshold ECDSA with Trustless Setup., , и . Public Key Cryptography (1), том 12710 из Lecture Notes in Computer Science, стр. 481-511. Springer, (2021)Certificate Based (Linkable) Ring Signature., , , и . ISPEC, том 4464 из Lecture Notes in Computer Science, стр. 79-92. Springer, (2007)Towards a Cryptographic Treatment of Publish/Subscribe Systems., , и . CANS, том 6467 из Lecture Notes in Computer Science, стр. 201-220. Springer, (2010)DualRing: Generic Construction of Ring Signatures with Efficient Instantiations., , , , и . CRYPTO (1), том 12825 из Lecture Notes in Computer Science, стр. 251-281. Springer, (2021)Group Signature Where Group Manager, Members and Open Authority Are Identity-Based., , и . ACISP, том 3574 из Lecture Notes in Computer Science, стр. 468-480. Springer, (2005)