Author of the publication

Provably secure robust threshold partial blind signature.

, , and . Sci. China Ser. F Inf. Sci., 49 (5): 604-615 (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Almost-tight Identity Based Encryption against Selective Opening Attack., , , and . IACR Cryptol. ePrint Arch., (2015)CCA-Secure PRE Scheme without Random Oracles., , and . IACR Cryptol. ePrint Arch., (2010)A traceable threshold signature scheme with multiple signing policies., and . Comput. Secur., 25 (3): 201-206 (2006)Secure identity-based multisignature schemes under quadratic residue assumptions., , and . Secur. Commun. Networks, 6 (6): 689-701 (2013)LPPA: Lightweight Privacy-Preserving Authentication From Efficient Multi-Key Secure Outsourced Computation for Location-Based Services in VANETs., , , , and . IEEE Trans. Inf. Forensics Secur., (2020)Auditable σ-Time Outsourced Attribute-Based Encryption for Access Control in Cloud Computing., , , , , and . IEEE Trans. Inf. Forensics Secur., 13 (1): 94-105 (2018)Efficient ID-Based Multi-Receiver Threshold Decryption., , and . Int. J. Found. Comput. Sci., 18 (5): 987-1004 (2007)GTSIM-POP: Game theory based secure incentive mechanism and patient-optimized privacy-preserving packet forwarding scheme in m-healthcare social networks., , , and . Future Gener. Comput. Syst., (2019)Existence of APAV(q, k) with q a prime power =5(mod 8) and k=1(mod 4)., , and . Discret. Math., 279 (1-3): 153-161 (2004)Security and Privacy for Cloud-Based IoT: Challenges., , , and . IEEE Commun. Mag., 55 (1): 26-33 (2017)