Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adaptively Secure Efficient Lattice (H)IBE in Standard Model with Short Public Parameters., , and . SPACE, volume 7644 of Lecture Notes in Computer Science, page 153-172. Springer, (2012)Lattice Forward-Secure Identity Based Encryption Scheme., , and . J. Internet Serv. Inf. Secur., 2 (3/4): 118-128 (2012)Efficient Lattice HIBE in the Standard Model with Shorter Public Parameters., , and . ICT-EurAsia, volume 8407 of Lecture Notes in Computer Science, page 542-553. Springer, (2014)Lattice Based Forward-Secure Identity Based Encryption Scheme with Shorter Ciphertext., , and . J. Internet Serv. Inf. Secur., 3 (1/2): 5-19 (2013)Lattice Based Universal Re-encryption for Mixnet., , and . J. Internet Serv. Inf. Secur., 4 (1): 1-11 (2014)Cryptanalysis of Unidirectional Proxy Re-Encryption Scheme., , and . ICT-EurAsia, volume 8407 of Lecture Notes in Computer Science, page 564-575. Springer, (2014)Lattice Based Identity Based Unidirectional Proxy Re-Encryption Scheme., , and . SPACE, volume 8804 of Lecture Notes in Computer Science, page 76-91. Springer, (2014)MHD flow past a stretching permeable sheet., , , and . Appl. Math. Comput., 210 (1): 26-32 (2009)Lattice Based Identity Based Proxy Re-Encryption Scheme., , and . J. Internet Serv. Inf. Secur., 3 (3/4): 38-51 (2013)