Author of the publication

Efficient single round attribute-based authenticated key exchange protocol.

, , and . Int. J. Comput. Math. Comput. Syst. Theory, 6 (4): 313-336 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy Preserving CACTUS Algorithm for Clustering over Vertically Partitioned Databases., and . DMIN, page 308-314. CSREA Press, (2007)A note on the Certificateless Multi-receiver Signcryption Scheme., , and . IACR Cryptology ePrint Archive, (2009)Compact CCA-Secure Encryption with Ciphertext Verifiability., , and . IACR Cryptology ePrint Archive, (2011)Foundations of Group Key Management - Framework, Security Model and a Generic Construction., , , and . IACR Cryptology ePrint Archive, (2008)A Pairing-Free, One Round Identity Based Authenticated Key Exchange Protocol Secure Against Memory-Scrapers., , and . IACR Cryptology ePrint Archive, (2016)Brief announcement: on the round complexity of distributed consensus over synchronous networks., , , , and . PODC, page 397. ACM, (2004)Possibility and complexity of probabilistic reliable communication in directed networks., and . PODC, page 265-274. ACM, (2006)Brief announcement: communication efficient asynchronous byzantine agreement., and . PODC, page 243-244. ACM, (2010)On the Optimal Communication Complexity of Multiphase Protocols for Perfect Communication., , and . S&P, page 311-320. IEEE Computer Society, (2007)Improving Accuracy of Differentially Private Kronecker Social Networks via Graph Clustering., , , and . ISNCC, page 1-6. IEEE, (2020)