Author of the publication

Lattice Based Identity Based Proxy Re-Encryption Scheme.

, , and . J. Internet Serv. Inf. Secur., 3 (3/4): 38-51 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Oblivious stable sorting protocol and oblivious binary search protocol for secure multi-party computation., , and . J. High Speed Networks, 27 (1): 67-82 (2021)An Efficient Multiple PKG Compatible Identity Based Key Agreement for Vehicular Networks., , , and . IACR Cryptology ePrint Archive, (2015)Lattice Based Forward-Secure Identity Based Encryption Scheme with Shorter Ciphertext., , and . J. Internet Serv. Inf. Secur., 3 (1/2): 5-19 (2013)Lattice Based Universal Re-encryption for Mixnet., , and . J. Internet Serv. Inf. Secur., 4 (1): 1-11 (2014)Efficient Lattice HIBE in the Standard Model with Shorter Public Parameters., , and . ICT-EurAsia, volume 8407 of Lecture Notes in Computer Science, page 542-553. Springer, (2014)Cryptanalysis for reduced round Salsa and ChaCha: revisited., and . IET Inf. Secur., 13 (6): 591-602 (2019)Provably secure lattice based identity based unidirectional PRE and PRE+ schemes., , , and . J. Inf. Secur. Appl., (2020)Cryptanalysis of Unidirectional Proxy Re-Encryption Scheme., , and . ICT-EurAsia, volume 8407 of Lecture Notes in Computer Science, page 564-575. Springer, (2014)Lattice-based identity-based resplittable threshold public key encryption scheme., , and . Int. J. Comput. Math., 93 (2): 289-307 (2016)Cryptanalysis of stream cipher LIZARD using division property and MILP based cube attack., and . Discret. Appl. Math., (2023)