Author of the publication

Efficient Sealed-Bid Auction Using Hash Chain.

, , and . ICISC, volume 2015 of Lecture Notes in Computer Science, page 183-191. Springer, (2000)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices., , , and . Public Key Cryptography, volume 7293 of Lecture Notes in Computer Science, page 467-484. Springer, (2012)Sufficient Condition for Identity-Based Authenticated Key Exchange Resilient to Leakage of Secret Keys., and . ICISC, volume 7259 of Lecture Notes in Computer Science, page 490-509. Springer, (2011)Revocable Hierarchical Identity-Based Authenticated Key Exchange., , , , , and . ICISC, volume 13218 of Lecture Notes in Computer Science, page 3-27. Springer, (2021)Strongly secure authenticated key exchange from factoring, codes, and lattices., , , and . Des. Codes Cryptogr., 76 (3): 469-504 (2015)Hierarchical ID-Based Authenticated Key Exchange Resilient to Ephemeral Key Leakage., , and . IWSEC, volume 6434 of Lecture Notes in Computer Science, page 164-180. Springer, (2010)Secure distributed constraint satisfaction: reaching agreement without revealing private information., , and . Artif. Intell., 161 (1-2): 229-245 (2005)Secure Distributed Constraint Satisfaction: Reaching Agreement without Revealing Private Information., , and . CP, volume 2470 of Lecture Notes in Computer Science, page 387-401. Springer, (2002)Receipt-Free Sealed-Bid Auction., and . ISC, volume 2433 of Lecture Notes in Computer Science, page 191-199. Springer, (2002)Secure Multi-Party Computation for Elliptic Curves., and . IWSEC, volume 8639 of Lecture Notes in Computer Science, page 98-108. Springer, (2014)Secure Generalized Vickrey Auction without Third-party Servers., and . Financial Cryptography, volume 3110 of Lecture Notes in Computer Science, page 132-146. Springer, (2004)