Author of the publication

Zero-Knowledge Proof System for Fully Anonymous Attribute Based Group Signatures from Lattices with VLR.

, , , and . WISA, volume 11897 of Lecture Notes in Computer Science, page 126-140. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A data-driven approach for reconstructing bifurcation diagrams of discrete dynamical systems., , and . LifeTech, page 294-295. IEEE, (2019)Password Based Anonymous Authentication with Private Information Retrieval., , , , and . J. Digit. Inf. Manag., 9 (2): 72-78 (2011)Cross-Certification Towards Distributed Authentication Infrastructure: A Case of Hyperledger Fabric., , , , , and . IEEE Access, (2020)Mobile 'tsunagari-kan': always-on, casual telecommunication., and . Mobile HCI, page 227-230. ACM, (2005)PPM: Privacy Policy Manager for Personalized Services., , , , and . CD-ARES Workshops, volume 8128 of Lecture Notes in Computer Science, page 377-392. Springer, (2013)Private Information Retrieval from Coded Storage in the Presence of Omniscient and Limited-Knowledge Byzantine Adversaries., , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 104-A (9): 1271-1283 (2021)Learning Multimodal Representations for Drowsiness Detection., , , , and . IEEE Trans. Intell. Transp. Syst., 23 (8): 11539-11548 (2022)Certificate Management Scheme for VANETs Using Blockchain Structure., , , , , and . Cryptogr., 6 (2): 20 (2022)Analysis of Trust Factors in Children's Abilities to Use Digital Devices., , , and . GoodIT, page 82-88. ACM, (2022)Systematizing the State of Knowledge in Detecting Privacy Sensitive Information in Unstructured Texts using Machine Learning., , , and . PST, page 1-7. IEEE, (2023)