Author of the publication

Efficient threshold public key encryption with full security based on dual pairing vector spaces.

, , , , and . Int. J. Commun. Syst., 27 (12): 4059-4077 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Data hiding in color halftone images based on new conjugate property., and . Comput. Electr. Eng., (2018)Minimum length key in MST cryptosystems., , , , and . Sci. China Inf. Sci., 60 (5): 052106:1-052106:11 (2017)Quantum network coding for multi-unicast problem based on 2D and 3D cluster states., , , , and . Sci. China Inf. Sci., 59 (4): 042301:1-042301:15 (2016)WORM-HUNTER: A Worm Guard System using Software-defined Networking., , , and . KSII Trans. Internet Inf. Syst., 11 (1): 484-510 (2017)IR-RBT Codes: A New Scheme of Regenerating Codes for Tolerating Node and Intra-node Failures in Distributed Storage Systems., , , , and . KSII Trans. Internet Inf. Syst., 13 (10): 5058-5077 (2019)Certificateless multi-signer universal designated multi-verifier signature from elliptic curve group., , and . KSII Trans. Internet Inf. Syst., 11 (11): 5625-5641 (2017)Defense Strategy of Network Security based on Dynamic Classification., , , , and . KSII Trans. Internet Inf. Syst., 9 (12): 5116-5134 (2015)Conjugate adjoining problem in braid groups and new design of braid-based signatures., , , , and . Sci. China Inf. Sci., 53 (3): 524-536 (2010)A CCA secure public key encryption scheme based on finite groups of Lie type., , , , , , , and . Sci. China Inf. Sci., (2022)Postfix automata., , , , and . Theor. Comput. Sci., (2015)