Author of the publication

How to Publicly Verifiably Expand a Member without Changing Old Shares in a Secret Sharing Scheme.

, , , and . ISI Workshops, volume 5075 of Lecture Notes in Computer Science, page 138-148. Springer, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

New Left-to-Right Radix- r Signed-Digit Recoding Algorithm for Pairing-Based Cryptosystems., , , and . TAMC, volume 4484 of Lecture Notes in Computer Science, page 189-198. Springer, (2007)Modeling and Deploying Networklet., , , , , , and . GLOBECOM, page 1-6. IEEE, (2017)A Forward Secure Threshold Signature Scheme Based on the Structure of Binary Tree., , , and . J. Softw., 4 (1): 73-80 (2009)Forward-Secure Multisignature, Threshold Signature and Blind Signature Schemes., , , , , , and . J. Networks, 5 (6): 634-641 (2010)Fault Attack on an Improved CRT-RSA Algorithm with the Modulus Chaining Method., , , , and . CSE/EUC (1), page 866-869. IEEE Computer Society, (2017)A Publicly Verifiable Dynamic Sharing Protocol for Data Secure Storage., , , and . WAIM, page 471-472. IEEE Computer Society, (2008)Analysis and Improvement of a Verifiable Phrase Search over Encrypted Data in a Single Phrase., , , and . 3PGCIC, page 840-843. IEEE Computer Society, (2015)Networklet: Concept and Deployment., , , , , , and . ICDCS, page 2624-2625. IEEE Computer Society, (2017)Secure Outsourcing for Normalized Cuts of Large-Scale Dense Graph in Internet of Things., , and . IEEE Internet Things J., 9 (14): 12711-12722 (2022)Efficient Privacy-Preserving Multi-Functional Data Aggregation Scheme for Multi-Tier IoT System., , , , , and . ISCC, page 857-863. IEEE, (2023)