Author of the publication

ID-Based Encryption with Equality Test Against Insider Attack.

, , , and . ACISP (1), volume 10342 of Lecture Notes in Computer Science, page 168-183. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient k-out-of-n oblivious transfer scheme with the ideal communication cost., , , , and . Theor. Comput. Sci., (2018)Efficient Public Key Encryption With Outsourced Equality Test for Cloud-Based IoT Environments., , and . IEEE Trans. Inf. Forensics Secur., (2022)Controllable forward secure identity-based encryption with equality test in privacy-preserving text similarity analysis., , , and . Inf. Sci., (March 2024)Public Key Encryption with Delegated Equality Test in a Multi-User Setting., , , and . Comput. J., 58 (4): 986-1002 (2015)CCA-Almost-Full Anonymous Group Signature with Verifier Local Revocation in the Standard Model., and . Comput. J., 64 (8): 1239-1252 (2021)Public Key Authenticated Encryption with Keyword Search Improved: Strong Security Model and Multi-keyword Construction., , , , and . Inscrypt (1), volume 14526 of Lecture Notes in Computer Science, page 299-319. Springer, (2023)Group ID-Based Encryption with Equality Test., , , , and . ACISP, volume 11547 of Lecture Notes in Computer Science, page 39-57. Springer, (2019)Stand-Alone Unlicensed LTE (SAiL)., , , , , and . GLOBECOM, page 1-5. IEEE, (2016)Functional signatures: new definition and constructions., , , , , and . Sci. China Inf. Sci., (2021)Overcoming the information overload problem in a multiform feedback-based virtual reality system for hand motion rehabilitation: healthy subject case study., , , and . Virtual Reality, 16 (4): 325-334 (2012)