Author of the publication

Designing efficient proxy signature schemes for mobile communication.

, , and . Sci. China Ser. F Inf. Sci., 51 (2): 183-195 (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Finite set theory and its application to cryptology. Journal of Statistical Planning and Inference, 51 (2): 129--136 (Apr 15, 1996)Efficient and secure electronic resume using smart cards., , , and . FSKD, page 2271-2274. IEEE, (2011)MMDSSE: Multi-client and Multi-keyword Dynamic Searchable Symmetric Encryption for Cloud Storage., , , , , , , , , and . PST, page 1-11. IEEE, (2023)Extended Nested Dual System Groups, Revisited., , , , and . Public Key Cryptography (1), volume 9614 of Lecture Notes in Computer Science, page 133-163. Springer, (2016)Security of an Efficient ID-Based Authenticated Key Agreement Protocol from Pairings., , and . ISPA Workshops, volume 3759 of Lecture Notes in Computer Science, page 342-349. Springer, (2005)Large Universe Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability., , , , and . ESORICS (2), volume 8713 of Lecture Notes in Computer Science, page 55-72. Springer, (2014)Chosen Ciphertext Secure Certificateless Threshold Encryption in the Standard Model., , and . Inscrypt, volume 5487 of Lecture Notes in Computer Science, page 201-216. Springer, (2008)Threshold Proxy Re-Signature., , and . IPCCC, page 450-455. IEEE Computer Society, (2008)Cryptanalysis and Improvement on An ID-Based Key Issuing Protocol., , , and . IMSCCS (2), page 8-12. IEEE Computer Society, (2006)0-7695-2581-4.ID-based threshold decryption without random oracles and its application in key escrow., , and . InfoSecu, page 119-124. ACM, (2004)