Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Time-selective convertible undeniable signatures with short conversion receipts., and . Inf. Sci., 180 (12): 2458-2475 (2010)Attribute-based encryption schemes with constant-size ciphertexts., , , , , and . Theor. Comput. Sci., (2012)Computational Differential Privacy for Encrypted Databases Supporting Linear Queries., , , and . IACR Cryptol. ePrint Arch., (2024)I want to ride my BICYCL: BICYCL Implements CryptographY in CLass groups., , , and . IACR Cryptol. ePrint Arch., (2022)On the Soundness of Restricted Universal Designated Verifier Signatures and Dedicated Signatures., and . ISC, volume 4779 of Lecture Notes in Computer Science, page 175-188. Springer, (2007)Blind Functional Encryption., , and . ICICS, volume 12282 of Lecture Notes in Computer Science, page 183-201. Springer, (2020)Public-Key Cryptography: Design and Algorithmic. (Cryptographie à clé publique: Conception et algorithmique).. (2011)A New Efficient Threshold Ring Signature Scheme Based on Coding Theory., , , and . IEEE Trans. Inf. Theory, 57 (7): 4833-4842 (2011)Universal Designated Verifier Signatures Without Random Oracles or Non-black Box Assumptions., , and . SCN, volume 4116 of Lecture Notes in Computer Science, page 63-77. Springer, (2006)Bandwidth-efficient threshold EC-DSA revisited: Online/offline extensions, identifiable aborts proactive and adaptive security., , , , and . Theor. Comput. Sci., (2023)