Author of the publication

On New Zero-Knowledge Proofs for Fully Anonymous Lattice-Based Group Signature Scheme with Verifier-Local Revocation.

, , , , and . ACNS Workshops, volume 12418 of Lecture Notes in Computer Science, page 381-399. Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Secure Document Self-Destruction Scheme with Identity Based Encryption., , , , and . INCoS, page 239-243. IEEE, (2013)Provably secure attribute based signcryption with delegated computation and efficient key updating., , , and . KSII Trans. Internet Inf. Syst., 11 (5): 2646-2659 (2017)FLEAM: A Federated Learning Empowered Architecture to Mitigate DDoS in Industrial IoT., , , , and . CoRR, (2020)The Component Diagnosability of General Networks., , , , and . CoRR, (2021)Dual Access Control for Cloud-Based Data Storage and Sharing., , , , , and . IEEE Trans. Dependable Secur. Comput., 19 (2): 1036-1048 (2022)The c-differential uniformity and boomerang uniformity of three classes of permutation polynomials over 픽2n., , , , and . IACR Cryptol. ePrint Arch., (2022)Secure, efficient and revocable multi-authority access control system in cloud storage., , , , , and . Comput. Secur., (2016)Model-Agnostic Adversarial Example Detection Through Logit Distribution Learning., , , , and . ICIP, page 3617-3621. IEEE, (2021)Differentially Private Location Protection with Continuous Time Stamps for VANETs., , , , and . ICA3PP (4), volume 11337 of Lecture Notes in Computer Science, page 204-219. Springer, (2018)Privacy-Preserving Fine-Grained Outsourcing PHR with Efficient Policy Updating., , , and . ICA3PP (2), volume 11945 of Lecture Notes in Computer Science, page 512-520. Springer, (2019)