Author of the publication

New construction of identity-based proxy re-encryption.

, , and . Digital Rights Management Workshop, page 47-50. ACM, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A New Leakage-Resilient IBE Scheme in the Relative Leakage Model., , and . DBSec, volume 6818 of Lecture Notes in Computer Science, page 263-270. Springer, (2011)A Variant of Boyen-Waters Anonymous IBE Scheme., , , , , and . ICICS, volume 7043 of Lecture Notes in Computer Science, page 42-56. Springer, (2011)A Trusted Sharing Model for Risk Information of Food Full-process and All-information Based on Blockchain and Federated Learning., , , , and . Blockchain, page 186-191. IEEE, (2023)A New Identity-Based Encryption Scheme with Accountable Authority Based on SM9., , , and . CECNet, volume 345 of Frontiers in Artificial Intelligence and Applications, page 440-449. IOS Press, (2021)Two-Message Key Exchange with Strong Security from Ideal Lattices., , and . CT-RSA, volume 10808 of Lecture Notes in Computer Science, page 98-115. Springer, (2018)FairCLIP: Harnessing Fairness in Vision-Language Learning., , , , , , , , , and 2 other author(s). CoRR, (2024)Normal Information Diffusion Distribution and Its Application in Inferring the Optimal Probability Density Functions of the Event Coordinates From the Microseismic or Acoustic Emission Sources., , and . IEEE Access, (2020)Heavy-Tailed Workload Aware Ad Hoc Routing., , , , and . ICC, page 2437-2442. IEEE, (2008)Research on risk management of commercial Banks under financial innovation based on fixed effects model., and . ICIIP, page 223-227. ACM, (2023)Modeling Networking Protocols to Test Intrusion Detection Systems., and . LCN, page 774-775. IEEE Computer Society, (2004)