Author of the publication

Secure and Efficient Identity-based Proxy Multi-signature Using Cubic Residues.

, , , and . Int. J. Netw. Secur., 18 (1): 90-98 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient group Diffie-Hellman key agreement protocols., and . Comput. Electr. Eng., 40 (6): 1972-1980 (2014)Security Analysis on Secure Untraceable Off-line Electronic Cash System., , and . Int. J. Netw. Secur., 18 (3): 454-458 (2016)Zero-pole cancellation for identity-based aggregators: a constant-size designated verifier-set signature., , , and . Frontiers Comput. Sci., 14 (4): 144806 (2020)An Efficient Dynamic Provable Data Possession Scheme in Cloud Storage., , , , and . GPC, volume 9663 of Lecture Notes in Computer Science, page 63-81. Springer, (2016)Efficient and Verifiable General Quantum Secret Sharing Based on Special Entangled State., , , and . IEEE Internet Things J., 11 (8): 14127-14135 (April 2024)Large Branching Tree Based Dynamic Provable Data Possession Scheme., , , and . J. Inf. Sci. Eng., 33 (3): 653-673 (2017)Bivariate polynomial-based secret sharing schemes with secure secret reconstruction., , , and . Inf. Sci., (2022)ABAEKS: Attribute-Based Authenticated Encryption With Keyword Search Over Outsourced Encrypted Data., , , and . IEEE Trans. Inf. Forensics Secur., (2023)Verifiable, Reliable, and Privacy-Preserving Data Aggregation in Fog-Assisted Mobile Crowdsensing., , , , , , and . IEEE Internet Things J., 8 (18): 14127-14140 (2021)Analysis on Token-Controlled Public Key Encryption., , , and . MSN, page 87-91. IEEE Computer Society, (2012)