Author of the publication

Purpose-restricted Anonymous Mobile Communications Using Anonymous Signatures in Online Credential Systems.

, , , and . Wireless Personal Communications, 54 (1): 225-236 (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CRYPTREC (Japanese Cryptographic Algorithm Evaluation Project)., and . Encyclopedia of Cryptography and Security (2nd Ed.), Springer, (2011)Error-correcting codes and cryptography., and . Appl. Algebra Eng. Commun. Comput., 19 (3): 213-228 (2008)On Channel Capacity and Modulation of Watermarks in Digital Still Images., and . Financial Cryptography, volume 1648 of Lecture Notes in Computer Science, page 125-139. Springer, (1999)Improvements on Security Proofs of Some Identity Based Encryption Schemes., and . CISC, volume 3822 of Lecture Notes in Computer Science, page 28-41. Springer, (2005)A Lower-Bound of Complexity for RSA-Based Password-Authenticated Key Exchange., , and . EuroPKI, volume 3545 of Lecture Notes in Computer Science, page 191-205. Springer, (2005)Chosen Ciphertext Secure Public Key Encryption with a Simple Structure., , , and . IWSEC, volume 5312 of Lecture Notes in Computer Science, page 20-33. Springer, (2008)An Efficient Compiler from Sigma-Protocol to 2-Move Deniable Zero-Knowledge., , and . ICALP (2), volume 4052 of Lecture Notes in Computer Science, page 46-57. Springer, (2006)Cryptanalysis of Keystream Generator by Decimated Sample Based Algebraic and Fast Correlation Attacks., , and . INDOCRYPT, volume 3797 of Lecture Notes in Computer Science, page 155-168. Springer, (2005)An Anonymous Loan System Based on Group Signature Scheme., , , and . ISC, volume 2433 of Lecture Notes in Computer Science, page 244-256. Springer, (2002)A CDH-Based Strongly Unforgeable Signature Without Collision Resistant Hash Function., , , , and . ProvSec, volume 4784 of Lecture Notes in Computer Science, page 68-84. Springer, (2007)