Author of the publication

Server-aided signatures verification secure against collusion attack.

, , and . Inf. Secur. Tech. Rep., 17 (3): 46-57 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Exclusion-Intersection Encryption., and . IACR Cryptology ePrint Archive, (2005)Ring Signatures without Random Oracles., , , and . IACR Cryptology ePrint Archive, (2005)Are you The One to Share? Secret Transfer with Access Structure., and . Proc. Priv. Enhancing Technol., 2017 (1): 149-169 (2017)Learning Model with Error - Exposing the Hidden Model of BAYHENN., , , , and . IJCAI, page 3529-3535. ijcai.org, (2020)Scheduled for July 2020, Yokohama, Japan, postponed due to the Corona pandemic..Can We Securely Outsource Big Data Analytics with Lightweight Cryptography?. SCC@AsiaCCS, page 1. ACM, (2019)Sharding Blockchain., , , , and . iThings/GreenCom/CPSCom/SmartData, page 1665. IEEE, (2018)PE(AR)2: Privacy-Enhanced Anonymous Authentication with Reputation and Revocation., , , , and . ESORICS, volume 7459 of Lecture Notes in Computer Science, page 679-696. Springer, (2012)Secure Cloud Storage Meets with Secure Network Coding., , , and . IEEE Trans. Computers, 65 (6): 1936-1948 (2016)Zero-Knowledge Argument for Simultaneous Discrete Logarithms., , and . Algorithmica, 64 (2): 246-266 (2012)Introduction to the Special Issue on Cryptographic Engineering for Internet of Things: Security Foundations, Lightweight Solutions, and Attacks., , , and . ACM Trans. Embed. Comput. Syst., 18 (3): 22:1-22:3 (2019)