Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A generic construction of CCA-secure deterministic encryption., , , , , and . Inf. Process. Lett., (2020)CCA2 secure public-key encryption scheme tolerating continual leakage attacks., , , and . Secur. Commun. Networks, 9 (17): 4505-4519 (2016)An Efficient and Provably Secure Identity Authentication Scheme for VANET., , , , and . IEEE Internet Things J., 10 (19): 17170-17183 (October 2023)Secure and Efficient Certificate-Based Proxy Signature Schemes for Industrial Internet of Things., , , , , and . IEEE Syst. J., 16 (3): 4719-4730 (2022)Novel generic construction of leakage-resilient PKE scheme with CCA security., , , , and . Des. Codes Cryptogr., 89 (7): 1575-1614 (2021)Continuous Leakage-Amplified Public-Key Encryption With CCA Security., , , , and . Comput. J., 65 (7): 1760-1775 (2022)Leakage-resilient CCA2-secure certificateless public-key encryption scheme without bilinear pairing., and . Inf. Process. Lett., (2018)An Efficient Key-Policy Attribute-Based Searchable Encryption in Prime-Order Groups., , , , , and . ProvSec, volume 10592 of Lecture Notes in Computer Science, page 39-56. Springer, (2017)Verifiable Secret Sharing Based on Hyperplane Geometry with Its Applications to Optimal Resilient Proactive Cryptosystems., , , , and . ACISP, volume 10946 of Lecture Notes in Computer Science, page 83-100. Springer, (2018)Novel updatable identity-based hash proof system and its applications., , , and . Theor. Comput. Sci., (2020)