Author of the publication

Secure Hierarchical Identity-Based Identification without Random Oracles.

, , and . ISC, volume 7483 of Lecture Notes in Computer Science, page 258-273. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Single Private-Key Generator Security Implies Multiple Private-Key Generators Security., and . ProvSec, volume 11192 of Lecture Notes in Computer Science, page 56-74. Springer, (2018)Secure Hierarchical Identity-Based Identification without Random Oracles., , and . ISC, volume 7483 of Lecture Notes in Computer Science, page 258-273. Springer, (2012)Predicate-Based Authenticated Key Exchange Resilient to Ephemeral Key Leakage., , and . WISA, volume 6513 of Lecture Notes in Computer Science, page 15-30. Springer, (2010)Interactive Bi-Proof Systems and Undeniable Signature Schemes., , and . EUROCRYPT, volume 547 of Lecture Notes in Computer Science, page 243-256. Springer, (1991)Non-malleable Multiple Public-Key Encryption., , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 97-A (6): 1318-1334 (2014)A Practical Secret Voting Scheme for Large Scale Elections, , and . ASIACRYPT '92, 718, page 244--251. Springer, (1993)Hierarchical ID-Based Authenticated Key Exchange Resilient to Ephemeral Key Leakage., , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 94-A (6): 1306-1317 (2011)Security Enhancements by OR-Proof in Identity-Based Identification., , and . ACNS, volume 7341 of Lecture Notes in Computer Science, page 135-152. Springer, (2012)Characterization of Strongly Secure Authenticated Key Exchanges without NAXOS Technique.. IWSEC, volume 7038 of Lecture Notes in Computer Science, page 33-50. Springer, (2011)Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices., , , and . Public Key Cryptography, volume 7293 of Lecture Notes in Computer Science, page 467-484. Springer, (2012)