Author of the publication

VEPP: A Verifiable, Highly Efficient and Privacy-Preserving Protocol for Outsourcing Large Matrix Multiplication.

, , , , , and . SSIC, page 1-8. IEEE, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Blockchain-Based Privacy-Preserving Scheme for Smart Grids., , , and . ICBCT, page 120-124. ACM, (2020)Generalized Goldwasser and Micali's Type Cryptosystem., , and . J. Comput. Sci. Technol., 37 (2): 459-467 (2022)LMCLAEKS: LWE-assisted multi-recipient certificateless authenticated encryption with keyword search., , , and . Inf. Sci., (November 2023)Identity based signature scheme based on cubic residues., , and . Sci. China Inf. Sci., 54 (10): 2001-2012 (2011)Secure and Efficient Attribute-Based Encryption with Keyword Search., , , and . Comput. J., 61 (8): 1133-1142 (2018)VEPP: A Verifiable, Highly Efficient and Privacy-Preserving Protocol for Outsourcing Large Matrix Multiplication., , , , , and . SSIC, page 1-8. IEEE, (2018)New Assumptions and Efficient Cryptosystems from the e-th Power Residue Symbol., , , , , and . ACISP, volume 12248 of Lecture Notes in Computer Science, page 408-424. Springer, (2020)Group Oriented Deniable Authentication Protocol., , , and . IMSCCS (2), page 89-92. IEEE Computer Society, (2006)0-7695-2581-4.PPOPM: More Efficient Privacy Preserving Outsourced Pattern Matching., , and . ESORICS (1), volume 9878 of Lecture Notes in Computer Science, page 135-153. Springer, (2016)EVOC: More efficient verifiable outsourced computation from any one-way trapdoor function., , , and . ICC, page 7444-7449. IEEE, (2015)