Author of the publication

Efficient revocable certificateless encryption against decryption key exposure.

, , , and . IET Information Security, 9 (3): 158-166 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Distributed Key Generation on Vector Space Access Structures in Bilinear Groups., and . INCoS, page 803-808. IEEE, (2013)A New Provably Secure Certificateless Signature Scheme., and . ICC, page 1685-1689. IEEE, (2008)Provably-secure electronic cash based on certificateless partially-blind signatures., , , and . Electronic Commerce Research and Applications, 10 (5): 545-552 (2011)Simulatable certificateless two-party authenticated key agreement protocol., , , and . Inf. Sci., 180 (6): 1020-1030 (2010)A Provably Secure Ring Signature Scheme with Bounded Leakage Resilience., , , , and . ISPEC, volume 8434 of Lecture Notes in Computer Science, page 388-402. Springer, (2014)Fast Scalar Multiplication on the Jacobian of a Family of Hyperelliptic Curves., , and . ICICS, volume 2229 of Lecture Notes in Computer Science, page 74-83. Springer, (2001)Delegation of signing rights using certificateless proxy signatures., , and . Inf. Sci., 184 (1): 298-309 (2012)Selection of Secure Hyperelliptic Curves of g_2 Based on a Subfield., , and . J. Comput. Sci. Technol., 17 (6): 836-842 (2002)Information-theoretical secure verifiable secret sharing with vector space access structures over bilinear groups and its applications., and . Future Generation Comp. Syst., (2015)Efficient revocable certificateless encryption against decryption key exposure., , , and . IET Information Security, 9 (3): 158-166 (2015)