Author of the publication

Towards a Secure Certificateless Proxy Re-Encryption Scheme.

, , , and . ProvSec, volume 8209 of Lecture Notes in Computer Science, page 330-346. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Efficient NIZK Scheme for Privacy-Preserving Transactions over Account-Model Blockchain., , , , and . IACR Cryptol. ePrint Arch., (2017)A survey of parallel particle tracing algorithms in flow visualization., and . J. Vis., 21 (3): 351-368 (2018)Smoothing Out Binary Linear Codes and Worst-case Sub-exponential Hardness for LPN., and . IACR Cryptol. ePrint Arch., (2020)Pushing the Limits of Valiant's Universal Circuits: Simpler, Tighter and More Compact., , , , and . IACR Cryptol. ePrint Arch., (2020)Authenticated Key Exchange from Ideal Lattices., , , and . IACR Cryptol. ePrint Arch., (2014)Non-Malleable Functions and Their Applications., , , , and . Public Key Cryptography (2), volume 9615 of Lecture Notes in Computer Science, page 386-416. Springer, (2016)A Novel Learning-based Global Path Planning Algorithm for Planetary Rovers., , and . CoRR, (2018)Towards a Secure Certificateless Proxy Re-Encryption Scheme., , , and . ProvSec, volume 8209 of Lecture Notes in Computer Science, page 330-346. Springer, (2013)Attribute-Based Keyword Search from Lattices., , , , and . Inscrypt, volume 12020 of Lecture Notes in Computer Science, page 66-85. Springer, (2019)An incentive mechanism design for mobile crowdsensing with demand uncertainties., , , , and . Inf. Sci., (2020)