Author of the publication

An efficient anonymous proxy signature scheme with provable security.

, , , and . Comput. Stand. Interfaces, 31 (2): 348-353 (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A new certificateless signature with enhanced security and aggregation version., , , and . Concurr. Comput. Pract. Exp., 28 (4): 1124-1133 (2016)云存储环境下支持策略变更的CP-ABE方案 (CP-ABE Scheme with Supporting Policy Elastic Updating in Cloud Storage Environment)., , and . 计算机科学, 43 (1): 191-194 (2016)Medical Image Encryption Scheme Based on Arnold Transformation and ID-AK Protocol., , , , and . Int. J. Netw. Secur., 19 (5): 776-784 (2017)User-to-User Mutual Authentication and Key Agreement Scheme for LTE Cellular System., , , , , and . Int. J. Netw. Secur., 18 (4): 769-781 (2016)Edge-Cloud-Assisted Certificate Revocation Checking: An Efficient Solution Against Irresponsible Service Providers., , , , , and . IEEE Internet Things J., 10 (17): 15563-15580 (September 2023)Server-aided searchable encryption in multi-user setting., , , and . Comput. Commun., (2020)A new group signature scheme for dynamic membership., , , and . Int. J. Electron. Secur. Digit. Forensics, 8 (4): 332-351 (2016)Blockchain-Based Transparent Integrity Auditing and Encrypted Deduplication for Cloud Storage., , , , and . IEEE Trans. Serv. Comput., 16 (1): 134-146 (January 2023)PFLM: Privacy-preserving federated learning with membership proof., , and . Inf. Sci., (2021)Identity-based provable data possession revisited: Security analysis and generic construction., , , , , , and . Comput. Stand. Interfaces, (2017)