Author of the publication

Certificateless Public Key Signature Schemes from Standard Algorithms.

, and . ISPEC, volume 11125 of Lecture Notes in Computer Science, page 179-197. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On The Indistinguishability-Based Security Model of Key Agreement Protocols-Simple Cases., , , and . IACR Cryptology ePrint Archive, (2005)An Efficient ID-KEM Based On The Sakai-Kasahara Key Construction., , , and . IACR Cryptol. ePrint Arch., (2005)On Security Proof of McCullagh-Barreto's Key Agreement Protocol and its Variants., and . IACR Cryptol. ePrint Arch., (2005)Identity-Based Key Agreement with Unilateral Identity Privacy Using Pairings., , , and . ISPEC, volume 3903 of Lecture Notes in Computer Science, page 202-213. Springer, (2006)The data processing method of FY-3 meteorological satellite., and . CHINACOM, page 918-920. IEEE Computer Society, (2011)Regression of Surface Spectral Emissivity From Hyperspectral Instruments., , , , , , , , , and . IEEE Trans. Geosci. Remote. Sens., 46 (2): 328-333 (2008)Security Proof of Sakai-Kasahara's Identity-Based Encryption Scheme., and . IMACC, volume 3796 of Lecture Notes in Computer Science, page 442-459. Springer, (2005)General and Efficient Certificateless Public Key Encryption Constructions., , , and . Pairing, volume 4575 of Lecture Notes in Computer Science, page 83-107. Springer, (2007)Certificateless Public Key Signature Schemes from Standard Algorithms., and . ISPEC, volume 11125 of Lecture Notes in Computer Science, page 179-197. Springer, (2018)Remove Key Escrow from The Identity-Based Encryption System., , and . IFIP TCS, volume 155 of IFIP, page 37-50. Kluwer/Springer, (2004)