Author of the publication

Constant-Size Group Signatures with Message-Dependent Opening from Lattices.

, , , and . ProvSec, volume 14217 of Lecture Notes in Computer Science, page 166-185. Springer, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Research on Identity Authentication Scheme of Internet of Things Equipment in 5G Network Environment., , , , and . ICCT, page 312-316. IEEE, (2019)Anonymous End to End Encryption Group Messaging Protocol Based on Asynchronous Ratchet Tree., and . ICICS, volume 12282 of Lecture Notes in Computer Science, page 588-605. Springer, (2020)A Collision Attack on a Double-Block-Length Compression Function Instantiated with Round-Reduced AES-256., , , and . ICISC, volume 8949 of Lecture Notes in Computer Science, page 271-285. Springer, (2014)An Outsourced Multi-authority Attribute-Based Encryption for Privacy Protection with Dynamicity and Audit., and . BlockTEA, volume 498 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 69-88. Springer, (2022)A Privacy-Preserving and Auditable Scheme for Interfacing Public Blockchain with Consortium Blockchain., and . BlockTEA, volume 498 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 89-105. Springer, (2022)Parallel Implementation of Sieving Algorithm on Heterogeneous CPU-GPU Computing Architectures., , , and . ISPEC, volume 15053 of Lecture Notes in Computer Science, page 258-272. Springer, (2024)Efficient Traceable Attribute-Based Signature With Update-Free Revocation For Blockchain., and . Comput. J., 66 (4): 842-865 (April 2023)A Solution for the Offline Double-Spending Issue of Digital Currencies., and . SciSec, volume 13580 of Lecture Notes in Computer Science, page 455-471. Springer, (2022)Development of an Early Warning System for Network Intrusion Detection Using Benford's Law Features., , , , and . SocialSec, volume 1095 of Communications in Computer and Information Science, page 57-73. Springer, (2019)Automatic Encryption Schemes Based on the Neural Networks: Analysis and Discussions on the Various Adversarial Models (Short Paper)., , , , and . ISPEC, volume 10701 of Lecture Notes in Computer Science, page 566-575. Springer, (2017)