Author of the publication

Aggregate Signature with Traceability of Devices Dynamically Generating Invalid Signatures.

, , , , , , , and . ACNS Workshops, volume 12809 of Lecture Notes in Computer Science, page 378-396. Springer, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Formal Treatment of Verifiable Privacy-Preserving Data-Aggregation Protocols., , , , , and . ProvSec, volume 11192 of Lecture Notes in Computer Science, page 415-422. Springer, (2018)SecretSign: A Method of Finding an Off-Line Target Object without Revealing the Target to Observers., , , , and . ITSC, page 3651-3656. IEEE, (2018)Attribute-Based Signatures for Circuits from Bilinear Map., , and . Public Key Cryptography (1), volume 9614 of Lecture Notes in Computer Science, page 283-300. Springer, (2016)Ciphertext-Policy Delegatable Hidden Vector Encryption and Its Application to Searchable Encryption in Multi-user Setting., , , , , , and . IMACC, volume 7089 of Lecture Notes in Computer Science, page 190-209. Springer, (2011)A Generic Method for Reducing Ciphertext Length of Reproducible KEMs in the RO Model., , , and . IWSEC, volume 6434 of Lecture Notes in Computer Science, page 55-69. Springer, (2010)Group Signature with Deniability: How to Disavow a Signature., , , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 100-A (9): 1825-1837 (2017)Constraints and Evaluations on Signature Transmission Interval for Aggregate Signatures with Interactive Tracing Functionality., , , , , , , and . ADIoT, volume 13745 of Lecture Notes in Computer Science, page 51-71. Springer, (2022)A Bayesian Network-Based Analysis of Changing Impact of Organizational Goals on Software Development., , , , , , , and . ISSREW, page 154-159. IEEE, (2023)A Remark on an Identity-Based Encryption Scheme with Non-interactive Opening., and . ISITA, page 703-706. IEEE, (2018)Group Signatures with Message-Dependent Opening., , , , , and . Pairing, volume 7708 of Lecture Notes in Computer Science, page 270-294. Springer, (2012)