Author of the publication

Lattice Based Forward-Secure Identity Based Encryption Scheme with Shorter Ciphertext.

, , and . J. Internet Serv. Inf. Secur., 3 (1/2): 5-19 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cryptanalysis of Unidirectional Proxy Re-Encryption Scheme., , and . ICT-EurAsia, volume 8407 of Lecture Notes in Computer Science, page 564-575. Springer, (2014)ID-Based Threshold Signcryption and Group Unsigncryption., , and . SNDS, volume 335 of Communications in Computer and Information Science, page 35-44. Springer, (2012)A Blockchain-Based Public Key Infrastructure For IoT-Based Healthcare Systems., and . Comput. J., 67 (4): 1531-1537 (2024)An Efficient Multiple PKG Compatible Identity Based Key Agreement for Vehicular Networks., , , and . IACR Cryptology ePrint Archive, (2015)Lattice Based Universal Re-encryption for Mixnet., , and . J. Internet Serv. Inf. Secur., 4 (1): 1-11 (2014)Lattice Based Forward-Secure Identity Based Encryption Scheme with Shorter Ciphertext., , and . J. Internet Serv. Inf. Secur., 3 (1/2): 5-19 (2013)Efficient Lattice HIBE in the Standard Model with Shorter Public Parameters., , and . ICT-EurAsia, volume 8407 of Lecture Notes in Computer Science, page 542-553. Springer, (2014)Efficient Lattice based (H)IB-DRE., , , , , and . J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 13 (4): 1-23 (2022)Oblivious stable sorting protocol and oblivious binary search protocol for secure multi-party computation., , and . J. High Speed Networks, 27 (1): 67-82 (2021)Cryptanalysis of Salsa and ChaCha: Revisited., and . MONAMI, volume 235 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 324-338. Springer, (2017)