Author of the publication

Certificateless Public Key Encryption in the Selective-ID Security Model (Without Random Oracles).

, , , and . Pairing, volume 4575 of Lecture Notes in Computer Science, page 60-82. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy-Preserving Identity Management System on Blockchain Using Zk-SNARK., and . IEEE Access, (2023)Generic construction of designated tester public-key encryption with keyword search., , and . Inf. Sci., (2012)Practical dynamic group signatures without knowledge extractors., , , and . Des. Codes Cryptogr., 91 (3): 853-893 (March 2023)Certificateless Public Key Encryption in the Selective-ID Security Model (Without Random Oracles)., , , and . Pairing, volume 4575 of Lecture Notes in Computer Science, page 60-82. Springer, (2007)Identity-Based Revocation From Subset Difference Methods Under Simple Assumptions., and . IEEE Access, (2019)Direct Chosen-Ciphertext Secure Hierarchical ID-Based Encryption Schemes., and . EuroPKI, volume 4582 of Lecture Notes in Computer Science, page 94-109. Springer, (2007)Timed up & go quantification algorithm using IMU and sEMG signal., , , , , , , , and . Biomed. Signal Process. Control., 80 (Part): 104309 (2023)Practical Dynamic Group Signature with Efficient Concurrent Joins and Batch Verifications., , , and . IACR Cryptol. ePrint Arch., (2020)Threshold Identity-Based Broadcast Encryption from Identity-Based Encryption., , , , and . FGIT-EL/DTA/UNESST, volume 352 of Communications in Computer and Information Science, page 99-102. Springer, (2012)An efficient public key functional encryption for inner product evaluations., , and . Neural Comput. Appl., 32 (17): 13117-13128 (2020)