Author of the publication

Identity-based Threshold Broadcast Encryption in the Standard Model.

, , and . TIIS, 4 (3): 400-410 (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Revocable and strongly unforgeable identity-based signature scheme in the standard model., , , and . Security and Communication Networks, 9 (14): 2422-2433 (2016)An Additively Homomorphic Encryption over Large Message Space., , , , and . IJITWE, 10 (3): 82-102 (2015)Chosen-ciphertext secure bidirectional proxy broadcast re-encryption schemes., and . IJICT, 8 (4): 405-419 (2016)Lattice-based deniable ring signatures., , , , , and . Int. J. Inf. Sec., 18 (3): 355-370 (2019)ECGSC: Elliptic Curve Based Generalized Signcryption., , , , and . UIC, volume 4159 of Lecture Notes in Computer Science, page 956-965. Springer, (2006)Meet-in-the-Middle Attack on 8 Rounds of the AES Block Cipher under 192 Key Bits., , and . ISPEC, volume 6672 of Lecture Notes in Computer Science, page 222-232. Springer, (2011)Diophantine Approximation Attack on a Fast Public Key Cryptosystem., and . ISPEC, volume 3903 of Lecture Notes in Computer Science, page 25-32. Springer, (2006)Lattice-based Threshold Ring Signature with Message Block Sharing., , , and . TIIS, 13 (2): 1003-1019 (2019)The Lower Bounds on the Second Order Nonlinearity of Cubic Boolean Functions., , and . IACR Cryptology ePrint Archive, (2010)A Comment on Gu Map-1., and . IACR Cryptology ePrint Archive, (2015)