Author of the publication

An Identity based Ring Signcryption Scheme with Public Verifiability.

, , , and . SECRYPT, page 362-371. SciTePress, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Splitting and Aggregating Signatures in Cryptocurrency Protocols., , , , and . DAPPCON, page 100-108. IEEE, (2019)Alternative Protocols for Generalized Oblivious Transfer., , and . ICDCN, volume 4904 of Lecture Notes in Computer Science, page 304-309. Springer, (2008)On Optimal Probabilistic Asynchronous Byzantine Agreement., and . ICDCN, volume 4904 of Lecture Notes in Computer Science, page 86-98. Springer, (2008)On the Optimal Communication Complexity of Multiphase Protocols for Perfect Communication., , and . S&P, page 311-320. IEEE Computer Society, (2007)Improving Accuracy of Differentially Private Kronecker Social Networks via Graph Clustering., , , and . ISNCC, page 1-6. IEEE, (2020)Privacy Preserving CACTUS Algorithm for Clustering over Vertically Partitioned Databases., and . DMIN, page 308-314. CSREA Press, (2007)On Composability of Reliable Unicast and Broadcast., , , and . ICDCN, volume 5935 of Lecture Notes in Computer Science, page 54-66. Springer, (2010)Weighted Independent Perfect Domination on Cocomparability Graphs., , and . Discret. Appl. Math., 63 (3): 215-222 (1995)New Approach to Practical Leakage-Resilient Public-Key Cryptography., , and . IACR Cryptol. ePrint Arch., (2017)Breaking and Fixing of an Identity Based Multi-Signcryption Scheme., , and . ProvSec, volume 5848 of Lecture Notes in Computer Science, page 61-75. Springer, (2009)