Author of the publication

Secure identity-based multisignature schemes under quadratic residue assumptions.

, , and . Secur. Commun. Networks, 6 (6): 689-701 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

PSCPA: Patient Self-controllable Privacy-preserving Cooperative Authentication in Distributed m-Healthcare Systems., and . IACR Cryptol. ePrint Arch., (2012)A New ID-Based Deniable Authentication Protocol., , , and . Informatica, 18 (1): 67-78 (2007)Anonymous IBE From Quadratic Residue With Fast Encryption., , , and . IACR Cryptol. ePrint Arch., (2020)A New Practical Limited Identity-Based Encryption Scheme., , and . Fundam. Informaticae, 80 (4): 461-474 (2007)Detecting Vehicle Anomaly in the Edge via Sensor Consistency and Frequency Characteristic., , , , , , , and . IEEE Trans. Veh. Technol., 68 (6): 5618-5628 (2019)Efficient privacy-preserving temporal and spacial data aggregation for smart grid communications., , and . Concurr. Comput. Pract. Exp., 28 (4): 1145-1160 (2016)Off-line Password Guessing Attack on an Efficient Key Agreement Protocol for Secure Authentication., and . Int. J. Netw. Secur., 3 (1): 35-38 (2006)Multi-use and unidirectional identity-based proxy re-encryption schemes., , and . Inf. Sci., 180 (20): 4042-4059 (2010)Efficient Attribute-Based Secure Keyword Search on the Cloud Storage., , , and . IACR Cryptology ePrint Archive, (2017)Remarks on Quantum Modular Exponentiation and Some Experimental Demonstrations of Shor's Algorithm., , and . IACR Cryptology ePrint Archive, (2014)