Author of the publication

An Experimentally Validated Feasible Quantum Protocol for Identity-Based Signature with Application to Secure Email Communication.

, , , , , and . CoRR, (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Post-quantum digital signature scheme based on multivariate cubic problem., , , and . J. Inf. Secur. Appl., (2020)Mul-IBS: a multivariate identity-based signature scheme compatible with IoT-based NDN architecture., , , , and . J. Cryptogr. Eng., 13 (2): 187-199 (June 2023)Efficient post-quantum private set-intersection protocol., , and . Int. J. Inf. Comput. Secur., 17 (3/4): 405-423 (2022)An Overview of Hash Based Signatures., , and . IACR Cryptol. ePrint Arch., (2023)Storage Friendly Provably Secure Multivariate Identity-Based Signature from Isomorphism of Polynomials Problem., , and . SECRYPT, page 595-602. SCITEPRESS, (2021)Cryptanalysis of LRainbow: The Lifted Rainbow Signature Scheme., and . ProvSec, volume 13059 of Lecture Notes in Computer Science, page 296-308. Springer, (2021)How to Meet Big Data When Private Set Intersection Realizes Constant Communication Complexity., and . ICICS, volume 9977 of Lecture Notes in Computer Science, page 445-454. Springer, (2016)Efficient Private Set Intersection Cardinality in the Presence of Malicious Adversaries., and . ProvSec, volume 9451 of Lecture Notes in Computer Science, page 326-339. Springer, (2015)Provably Secure Private Set Intersection With Constant Communication Complexity.. Int. J. Cyber Warf. Terror., 9 (2): 39-64 (2019)Post-quantum protocol for computing set intersection cardinality with linear complexity., , , and . IET Inf. Secur., 14 (6): 661-669 (2020)