Author of the publication

Round-optimal zero-knowledge proofs of knowledge for NP.

, , , and . Sci. China Inf. Sci., 55 (11): 2473-2484 (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Universally composable zero-knowledge sets., , and . Int. J. Grid Util. Comput., 3 (1): 25-31 (2012)Round-optimal zero-knowledge proofs of knowledge for NP., , , and . Sci. China Inf. Sci., 55 (11): 2473-2484 (2012)Cybersecurity Attacks in Vehicle-to-Infrastructure (V2I) Applications and their Prevention., , , and . CoRR, (2017)Multi-Hop Unidirectional Proxy Re-Encryption from Multilinear Maps., , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 98-A (2): 762-766 (2015)Threatening Patch Attacks on Object Detection in Optical Remote Sensing Images., , , , and . CoRR, (2023)Leakage-Resilient Zero-Knowledge Proofs of Knowledge for NP., , and . NSS, volume 7873 of Lecture Notes in Computer Science, page 365-380. Springer, (2013)On the Safety and Efficiency of Virtual Firewall Elasticity Control., , , , , , and . NDSS, The Internet Society, (2017)Understanding and Detecting Remote Infection on Linux-based IoT Devices., , , , , , and . AsiaCCS, page 873-887. ACM, (2022)When NFV Meets ANN: Rethinking Elastic Scaling for ANN-based NFs., , , , , , and . ICNP, page 1-6. IEEE, (2019)VNGuard: An NFV/SDN combination framework for provisioning and managing virtual firewalls., , , , , , , and . NFV-SDN, page 107-114. IEEE, (2015)