Author of the publication

Identity-based partially blind signature in the standard model for electronic cash.

, , and . Mathematical and Computer Modelling, 58 (1-2): 196-203 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cryptanalysis of an Identity Based Signcryption without Random Oracles., , and . Fundam. Inform., 107 (1): 105-109 (2011)An Improved Certificateless Signature Scheme Secure in the Standard Model., , and . Fundam. Inform., 88 (1-2): 193-206 (2008)Simulatability and Security of Certificateless Threshold Signatures without Random Oracles., , and . CIS (2), page 308-313. IEEE Computer Society, (2008)978-0-7695-3508-1.Secure and efficient data transmission in the Internet of Things., , and . Telecommunication Systems, 62 (1): 111-122 (2016)Identity-Based Auditing for Shared Cloud Data With Efficient and Secure Sensitive Information Hiding., , , , and . IEEE Access, (2019)An Improved Authenticated Encryption Scheme., , and . IEICE Transactions, 94-D (11): 2171-2172 (2011)Black Box Traceable Ciphertext Policy Attribute-Based Encryption Scheme., , and . Information, 6 (3): 481-493 (2015)Identity-Based User Authenticated Key Agreement Protocol for Multi-Server Environment with Anonymity., , , , and . MONET, 24 (3): 890-902 (2019)A Secure ECC-based RFID Mutual Authentication Protocol to Enhance Patient Medication Safety., , , and . J. Medical Systems, 40 (1): 12:1-12:6 (2016)Provably Secure Heterogeneous Access Control Scheme for Wireless Body Area Network., , , , and . J. Medical Systems, 42 (6): 108 (2018)