Author of the publication

Signcryption in Hierarchical Identity Based Cryptosystem.

, , , and . SEC, volume 181 of IFIP, page 443-457. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

How to construct identity-based signatures without the key escrow problem., , and . Int. J. Inf. Sec., 9 (4): 297-311 (2010)Ring signatures without random oracles., , , and . AsiaCCS, page 297-302. ACM, (2006)RingCT 3.0 for Blockchain Confidential Transaction: Shorter Size and Stronger Security., , , , , , and . IACR Cryptol. ePrint Arch., (2019)Encryption Schemes with Post-Challenge Auxiliary Inputs., , and . IACR Cryptology ePrint Archive, (2013)Signcryption in Hierarchical Identity Based Cryptosystem., , , and . IACR Cryptology ePrint Archive, (2004)PAChain: Private, authenticated & auditable consortium blockchain and its implementation.. Future Gener. Comput. Syst., (2020)DualRing: Generic Construction of Ring Signatures with Efficient Instantiations., , , , and . CRYPTO (1), volume 12825 of Lecture Notes in Computer Science, page 251-281. Springer, (2021)BlindHub: Bitcoin-Compatible Privacy-Preserving Payment Channel Hubs Supporting Variable Amounts., , , , , , , , , and . SP, page 2462-2480. IEEE, (2023)One-More Unforgeability of Blind ECDSA., , and . ESORICS (2), volume 12973 of Lecture Notes in Computer Science, page 313-331. Springer, (2021)Tight Leakage-Resilient Identity-based Encryption under Multi-challenge Setting., , , and . AsiaCCS, page 42-53. ACM, (2022)