Author of the publication

Quantum-Resistant Identity-Based Signature with Message Recovery and Proxy Delegation.

, , , , , , and . Symmetry, 11 (2): 272 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Improved Certificateless Signcryption in the Standard Model., and . Int. J. Netw. Secur., 17 (5): 597-606 (2015)Privacy-Preserving Self-Helped Medical Diagnosis Scheme Based on Secure Two-Party Computation in Wireless Sensor Networks., , , and . Comput. Math. Methods Medicine, (2014)A Lattice-Based Unordered Aggregate Signature Scheme Based on the Intersection Method., , , , and . IEEE Access, (2018)Scalable Fuzzy Keyword Ranked Search Over Encrypted Data on Hybrid Clouds., , , , , and . IEEE Trans. Cloud Comput., 11 (1): 308-323 (January 2023)Decentralized, Revocable and Verifiable Attribute-Based Encryption in Hybrid Cloud System., , , , , , and . Wirel. Pers. Commun., 106 (2): 719-738 (2019)Certificateless proxy multi-signature., and . Inf. Sci., (2014)Cryptanalysis and improvement of a certificateless encryption scheme in the standard model., , , and . Frontiers Comput. Sci., 8 (1): 163-173 (2014)Study on the Technology of the Secure Computation in the Different Adversarial Models., , , and . CSISE (1), volume 104 of Advances in Intelligent and Soft Computing, page 473-478. Springer, (2011)Efficient Encrypted Range Query on Cloud Platforms., , , , , and . ACM Trans. Cyber Phys. Syst., 6 (3): 27:1-27:23 (2022)Cryptanalysis and improvement of two certificateless three-party authenticated key agreement protocols, , , , and . CoRR, (2013)