Author of the publication

eCK Secure Single Round ID-based Authenticated Key Exchange Protocols with Master Perfect Forward Secrecy (Extended Version).

, , and . J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 5 (4): 65-85 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Delegation-based conversion from CPA to CCA-secure predicate encryption., and . Int. J. Appl. Cryptogr., 4 (1): 16-35 (2020)CCA-secure Predicate Encryption from Pair Encoding in Prime Order Groups: Generic and Efficient., , and . INDOCRYPT, volume 10698 of Lecture Notes in Computer Science, page 85-106. Springer, (2017)On the security of joint signature and encryption revisited., and . J. Math. Cryptol., 10 (3-4): 181-221 (2016)Identity-Based Signature and Extended Forking Algorithm in the Multivariate Quadratic Setting., , and . INDOCRYPT, volume 13143 of Lecture Notes in Computer Science, page 387-412. Springer, (2021)Signcryption in a Quantum World., , , and . IACR Cryptol. ePrint Arch., (2020)Attribute-Based Signcryption : Signer Privacy, Strong Unforgeability and IND-CCA2 Security in Adaptive-Predicates Attack., , and . IACR Cryptology ePrint Archive, (2015)Adaptively Secure Functional Encryption for Finite Languages from DLIN Assumption., and . IACR Cryptology ePrint Archive, (2014)Generic Conversions from CPA to CCA secure Functional Encryption., and . IACR Cryptology ePrint Archive, (2015)Efficient Fully Secure Attribute-Based Encryption Schemes for General Access Structures., and . ProvSec, volume 7496 of Lecture Notes in Computer Science, page 193-214. Springer, (2012)Verifiability-based conversion from CPA to CCA-secure predicate encryption., and . Appl. Algebra Eng. Commun. Comput., 29 (1): 77-102 (2018)