Author of the publication

A general framework for secure sharing of personal health records in cloud system.

, , , , , , and . J. Comput. Syst. Sci., (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Signcryption in Hierarchical Identity Based Cryptosystem., , , and . IACR Cryptology ePrint Archive, (2004)Encryption Schemes with Post-Challenge Auxiliary Inputs., , and . IACR Cryptology ePrint Archive, (2013)Ring signatures without random oracles., , , and . AsiaCCS, page 297-302. ACM, (2006)How to construct identity-based signatures without the key escrow problem., , and . Int. J. Inf. Sec., 9 (4): 297-311 (2010)PAChain: Private, authenticated & auditable consortium blockchain and its implementation.. Future Gener. Comput. Syst., (2020)RingCT 3.0 for Blockchain Confidential Transaction: Shorter Size and Stronger Security., , , , , , and . IACR Cryptol. ePrint Arch., (2019)Compact Zero-Knowledge Proofs for Threshold ECDSA with Trustless Setup., , and . Public Key Cryptography (1), volume 12710 of Lecture Notes in Computer Science, page 481-511. Springer, (2021)Tight Leakage-Resilient Identity-based Encryption under Multi-challenge Setting., , , and . AsiaCCS, page 42-53. ACM, (2022)BlindHub: Bitcoin-Compatible Privacy-Preserving Payment Channel Hubs Supporting Variable Amounts., , , , , , , , , and . SP, page 2462-2480. IEEE, (2023)DualRing: Generic Construction of Ring Signatures with Efficient Instantiations., , , , and . CRYPTO (1), volume 12825 of Lecture Notes in Computer Science, page 251-281. Springer, (2021)