Author of the publication

Chapter Four - Provably secure verifier-based password authenticated key exchange based on lattices.

, , , , and . Adv. Comput., (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Attribute-Based Verifiable Conditional Proxy Re-Encryption Scheme., , , , and . Entropy, 25 (5): 822 (2023)Attribute-Based Encryption Scheme Supporting Tree-Access Structure on Ideal Lattices., , , and . ICCCS (3), volume 11065 of Lecture Notes in Computer Science, page 519-527. Springer, (2018)Chapter Four - Provably secure verifier-based password authenticated key exchange based on lattices., , , , and . Adv. Comput., (2021)A remote sensing encrypted data search method based on a novel double-chain., , , and . Connect. Sci., (December 2023)Secure and Efficient Image Compression-Encryption Scheme Using New Chaotic Structure and Compressive Sensing., , and . Secur. Commun. Networks, (2020)Dynamic forward secure searchable encryption scheme with phrase search for smart healthcare., , , , and . J. Syst. Archit., (November 2023)Efficient lattice-based traceable ring signature scheme with its application in blockchain., , , and . Inf. Sci., (November 2023)Adaptively Chosen Ciphertext Secure Lattice IBE Based Programmable Hash Function in the Standard Model., , , and . ICCCS (3), volume 11065 of Lecture Notes in Computer Science, page 468-478. Springer, (2018)Multi-keywords fuzzy search encryption supporting dynamic update in an intelligent edge network., , , and . Connect. Sci., 34 (1): 511-528 (2022)An Android Malicious Application Detection Method with Decision Mechanism in the Operating Environment of Blockchain., , , , , and . Secur. Commun. Networks, (2022)