Author of the publication

A (k, t, n) Verifiable Multi-secret Sharing Scheme Based on Adversary Structure.

, , , , and . KSII Trans. Internet Inf. Syst., 8 (12): 4552-4567 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automatic Construction of Building Footprints From Airborne LIDAR Data., , and . IEEE Trans. Geosci. Remote. Sens., 44 (9): 2523-2533 (2006)Identity-based signcryption from lattices., , , , and . Secur. Commun. Networks, 8 (18): 3751-3770 (2015)A cheater identifiable multi-secret sharing scheme based on the Chinese remainder theorem., , , , and . Secur. Commun. Networks, 8 (18): 3592-3601 (2015)Practical NTRU Signcryption in the Standard Model., , , , , and . Entropy, 25 (12): 1651 (December 2023)An Efficient Proxy Re-Encryption Based on (Semi) Group Factorization Problems., , , and . INCoS, page 199-202. IEEE, (2016)A (k, t, n) Verifiable Multi-secret Sharing Scheme Based on Adversary Structure., , , , and . KSII Trans. Internet Inf. Syst., 8 (12): 4552-4567 (2014)CCA Secure Threshold KEM Scheme Against Adaptive Corruption Attacks in Standard Model., , , and . J. Softw., 8 (5): 1245-1253 (2013)Model guided DLP 3D printing for solid and hollow structure., , , , , and . HSI, page 1-6. IEEE, (2021)A Graph Reduction Method for 2D Snake Problems., , , , and . CVPR, IEEE Computer Society, (2007)A Nonlinear Variational Model for PET Reconstruction., and . ICPR (4), page 699-702. IEEE Computer Society, (2006)