Author of the publication

Assertions Signcryption Scheme in Decentralized Autonomous Trust Environments.

, , , and . ATC, volume 5060 of Lecture Notes in Computer Science, page 516-526. Springer, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

LR-FEAD: leakage-tolerating and attribute-hiding functional encryption mechanism with delegation in affine subspaces., , and . J. Supercomput., 70 (3): 1405-1432 (2014)Certificate-based Smooth Projective Hashing and Its Applications., , and . Int. J. Netw. Secur., 20 (2): 266-277 (2018)A direct construction of continuous leakage-resilient (H)IBE scheme with CCA security from dual system encryption., , , , , and . Comput. Stand. Interfaces, (2023)Leakage-resilient identity-based cryptography from minimal assumptions., , , , , and . Des. Codes Cryptogr., 91 (11): 3757-3801 (November 2023)Token-Leakage Tolerant and Vector Obfuscated IPE and Application in Privacy-Preserving Two-Party Point/Polynomial Evaluations., and . Comput. J., 59 (4): 493-507 (2016)A Feasible Quantum Protocol for Private Set Intersection Cardinality., and . IEEE Access, (2019)A Classified Credential Selection Scheme with Disclosure-minimizing Privacy., , and . JDCTA, 4 (9): 201-211 (2010)Structure-Preserving Linearly Homomorphic Signature with Designated Combiner for Subspace., , and . ACISP, volume 13494 of Lecture Notes in Computer Science, page 229-243. Springer, (2022)A Fair (t, n)-Threshold Secret Sharing Scheme with Efficient Cheater Identifying., , , and . IFIPTM, volume 563 of IFIP Advances in Information and Communication Technology, page 122-132. Springer, (2019)A Multi-task Mobile Crowdsensing Scheme with Conditional Privacy Preserving for Vehicle Networks., , , , and . EISA, volume 1641 of Communications in Computer and Information Science, page 21-36. Springer, (2022)