Author of the publication

Identity-based partially blind signature in the standard model for electronic cash.

, , and . Mathematical and Computer Modelling, 58 (1-2): 196-203 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Simulatability and Security of Certificateless Threshold Signatures without Random Oracles., , and . CIS (2), page 308-313. IEEE Computer Society, (2008)978-0-7695-3508-1.Secure and efficient data transmission in the Internet of Things., , and . Telecommunication Systems, 62 (1): 111-122 (2016)Cryptanalysis of an Identity Based Signcryption without Random Oracles., , and . Fundam. Inform., 107 (1): 105-109 (2011)An Improved Certificateless Signature Scheme Secure in the Standard Model., , and . Fundam. Inform., 88 (1-2): 193-206 (2008)Identity-Based Auditing for Shared Cloud Data With Efficient and Secure Sensitive Information Hiding., , , , and . IEEE Access, (2019)An Improved Authenticated Encryption Scheme., , and . IEICE Transactions, 94-D (11): 2171-2172 (2011)Black Box Traceable Ciphertext Policy Attribute-Based Encryption Scheme., , and . Information, 6 (3): 481-493 (2015)Identity-Based User Authenticated Key Agreement Protocol for Multi-Server Environment with Anonymity., , , , and . MONET, 24 (3): 890-902 (2019)Analysis of an ABE Scheme with Verifiable Outsourced Decryption., , , , and . Sensors, 18 (1): 176 (2018)A Secure ECC-based RFID Mutual Authentication Protocol to Enhance Patient Medication Safety., , , and . J. Medical Systems, 40 (1): 12:1-12:6 (2016)