Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Practical Secret Voting Scheme for Large Scale Elections, , and . ASIACRYPT '92, 718, page 244--251. Springer, (1993)Predicate-Based Authenticated Key Exchange Resilient to Ephemeral Key Leakage., , and . WISA, volume 6513 of Lecture Notes in Computer Science, page 15-30. Springer, (2010)Interactive Bi-Proof Systems and Undeniable Signature Schemes., , and . EUROCRYPT, volume 547 of Lecture Notes in Computer Science, page 243-256. Springer, (1991)Single Private-Key Generator Security Implies Multiple Private-Key Generators Security., and . ProvSec, volume 11192 of Lecture Notes in Computer Science, page 56-74. Springer, (2018)Secure Hierarchical Identity-Based Identification without Random Oracles., , and . ISC, volume 7483 of Lecture Notes in Computer Science, page 258-273. Springer, (2012)Hierarchical ID-Based Authenticated Key Exchange Resilient to Ephemeral Key Leakage., , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 94-A (6): 1306-1317 (2011)Non-malleable Multiple Public-Key Encryption., , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 97-A (6): 1318-1334 (2014)Security Enhancements by OR-Proof in Identity-Based Identification., , and . ACNS, volume 7341 of Lecture Notes in Computer Science, page 135-152. Springer, (2012)Secure Bit Commitment Function against Divertibility., , and . EUROCRYPT, volume 658 of Lecture Notes in Computer Science, page 324-340. Springer, (1992)ESIGN: An Efficient Digital Signature Implementation for Smard Cards., , and . EUROCRYPT, volume 547 of Lecture Notes in Computer Science, page 446-457. Springer, (1991)