Author of the publication

A Tightly Secure ID-Based Signature Scheme Under DL Assumption in AGM.

, , , and . ACISP, volume 13915 of Lecture Notes in Computer Science, page 199-219. Springer, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A model-driven approach to reengineering processes in cloud computing., , , , , and . Inf. Softw. Technol., (2022)Traceable Monero: Anonymous Cryptocurrency with Enhanced Accountability., , , , , and . IEEE Trans. Dependable Secur. Comput., 18 (2): 679-691 (2021)Sanitizable Access Control System for Secure Cloud Storage Against Malicious Data Publishers., , , , , and . IEEE Trans. Dependable Secur. Comput., 19 (3): 2138-2148 (2022)Generally Hybrid Proxy Re-Encryption: A Secure Data Sharing among Cryptographic Clouds., , , , , and . AsiaCCS, page 913-918. ACM, (2016)High Quality Audio Adversarial Examples Without Using Psychoacoustics., , and . CSS, volume 13547 of Lecture Notes in Computer Science, page 163-177. Springer, (2022)The Power of Bamboo: On the Post-Compromise Security for Searchable Symmetric Encryption., , , , , , and . NDSS, The Internet Society, (2023)Functional Encryption for Pattern Matching with a Hidden String., , , , and . Cryptogr., 6 (1): 1 (2022)A new efficient optimistic fair exchange protocol without random oracles., , , and . Int. J. Inf. Sec., 11 (1): 53-63 (2012)Certificateless designated verifier signature revisited: achieving a concrete scheme in the standard model., , and . Int. J. Inf. Sec., 18 (5): 619-635 (2019)Sequence aware functional encryption and its application in searchable encryption., , , , and . J. Inf. Secur. Appl., (2017)