Author of the publication

Generic constructions for universal designated-verifier signatures and identitybased signatures from standard signatures.

, and . IET Inf. Secur., 3 (4): 152-176 (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Generic constructions for universal designated-verifier signatures and identitybased signatures from standard signatures., and . IET Inf. Secur., 3 (4): 152-176 (2009)Construction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures., and . IACR Cryptology ePrint Archive, (2007)New security notions and relations for public-key encryption., , , and . J. Math. Cryptol., 6 (3-4): 183-227 (2012)Authenticated Key Exchange over Bitcoin., , , and . SSR, volume 9497 of Lecture Notes in Computer Science, page 3-20. Springer, (2015)Electoral Systems Used around the World.. CoRR, (2016)Private Fingerprint Matching., , and . ACISP, volume 7372 of Lecture Notes in Computer Science, page 426-433. Springer, (2012)Reconciling user privacy and implicit authentication for mobile devices., , and . Comput. Secur., (2015)The Fairy-Ring Dance: Password Authenticated Key Exchange in a Group., , , and . IoTPTS@AsiaCCS, page 27-34. ACM, (2015)Towards Bitcoin Payment Networks., , , and . ACISP (1), volume 9722 of Lecture Notes in Computer Science, page 57-76. Springer, (2016)TouchSignatures: Identification of User Touch Actions and PINs Based on Mobile Sensor Data via JavaScript., , , and . CoRR, (2016)