Author of the publication

Certificateless Public Key Encryption in the Selective-ID Security Model (Without Random Oracles).

, , , and . Pairing, volume 4575 of Lecture Notes in Computer Science, page 60-82. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An efficient public key functional encryption for inner product evaluations., , and . Neural Comput. Appl., 32 (17): 13117-13128 (2020)Bogus Data Filtering in Sensor Networks., , , and . PAKDD Workshops, volume 4819 of Lecture Notes in Computer Science, page 629-635. Springer, (2007)A New Public Key Broadcast Encryption Using Boneh-Boyen-Goh's HIBE Scheme., and . ISPEC, volume 4991 of Lecture Notes in Computer Science, page 101-115. Springer, (2008)Generic construction of designated tester public-key encryption with keyword search., , and . Inf. Sci., (2012)Privacy-Preserving Identity Management System on Blockchain Using Zk-SNARK., and . IEEE Access, (2023)Practical dynamic group signatures without knowledge extractors., , , and . Des. Codes Cryptogr., 91 (3): 853-893 (March 2023)Timed up & go quantification algorithm using IMU and sEMG signal., , , , , , , , and . Biomed. Signal Process. Control., 80 (Part): 104309 (2023)Practical Dynamic Group Signature with Efficient Concurrent Joins and Batch Verifications., , , and . IACR Cryptol. ePrint Arch., (2020)Certificateless Public Key Encryption in the Selective-ID Security Model (Without Random Oracles)., , , and . Pairing, volume 4575 of Lecture Notes in Computer Science, page 60-82. Springer, (2007)Identity-Based Revocation From Subset Difference Methods Under Simple Assumptions., and . IEEE Access, (2019)