Author of the publication

Compact Ring Signatures with Post-Quantum Security in Standard Model.

, , , , , and . Inscrypt (1), volume 14526 of Lecture Notes in Computer Science, page 65-84. Springer, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Message Communication Protocol Among Vehicles in Smart City., , , and . IEEE Trans. Vehicular Technology, 67 (5): 4359-4373 (2018)Attack on Han et al.'s ID-based Confirmer (Undeniable) Signature at ACM-EC'03., , and . IACR Cryptology ePrint Archive, (2003)A New Short Signature Scheme Without Random Oracles from Bilinear Pairings., , , and . IACR Cryptology ePrint Archive, (2005)Policy controlled system with anonymity., , and . Theor. Comput. Sci., (2018)Introduction to Security Reduction, , and . Springer, (2018)How to construct identity-based signatures without the key escrow problem., , and . Int. J. Inf. Sec., 9 (4): 297-311 (2010)Threshold privacy-preserving cloud auditing with multiple uploaders., , , , and . Int. J. Inf. Sec., 18 (3): 321-331 (2019)Server-aided signatures verification secure against collusion attack., , and . Inf. Secur. Tech. Rep., 17 (3): 46-57 (2013)Efficient Controlled Signature for a Large Network with Multi Security-level Setting., , and . J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 10 (3): 1-20 (2019)Exploiting QR Code Error Correction for Digital Image Watermarking., , , , and . J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 12 (2): 114-140 (2021)