Author of the publication

Comments on "verifiable outsourced attribute-based signature scheme".

. Multimedia Tools Appl., 78 (9): 11735-11742 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fully Verifiable Secure Delegation of Pairing Computation: Cryptanalysis and An Efficient Construction., , and . IACR Cryptology ePrint Archive, (2017)A New Partial Key Exposure Attack on Multi-power RSA., , and . CAI, volume 9270 of Lecture Notes in Computer Science, page 103-114. Springer, (2015)A Secure and Efficient Protocol for Electronic Treasury Auctions., , and . BalkanCryptSec, volume 9024 of Lecture Notes in Computer Science, page 123-140. Springer, (2014)A More Efficient Secure Fully Verifiable Delegation Scheme for Simultaneous Group Exponentiations., and . ISDDC, volume 11317 of Lecture Notes in Computer Science, page 74-93. Springer, (2018)More Efficient Secure Outsourcing Methods for Bilinear Maps., , , and . IACR Cryptology ePrint Archive, (2015)Hide the Modulus: A Secure Non-Interactive Fully Verifiable Delegation Scheme for Modular Exponentiations via CRT., , and . ISC, volume 11060 of Lecture Notes in Computer Science, page 250-267. Springer, (2018)Efficient and verifiable algorithms for secure outsourcing of cryptographic computations., and . Int. J. Inf. Sec., 15 (5): 519-537 (2016)Comments on "verifiable outsourced attribute-based signature scheme".. Multimedia Tools Appl., 78 (9): 11735-11742 (2019)Construction of Arithmetic Secret Sharing Schemes by Using Torsion Limits., and . IACR Cryptology ePrint Archive, (2015)Still Wrong Use of Pairings in Cryptography., and . IACR Cryptology ePrint Archive, (2016)