Author of the publication

ID-Based Encryption with Equality Test Against Insider Attack.

, , , and . ACISP (1), volume 10342 of Lecture Notes in Computer Science, page 168-183. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Attribute-Based Signing Right Delegation., , and . NSS, volume 8792 of Lecture Notes in Computer Science, page 323-334. Springer, (2014)Jhanwar-Barua's Identity-Based Encryption Revisited., , and . NSS, volume 8792 of Lecture Notes in Computer Science, page 271-284. Springer, (2014)Convertible Undeniable Proxy Signatures: Security Models and Efficient Construction., , , and . WISA, volume 4867 of Lecture Notes in Computer Science, page 16-29. Springer, (2007)An efficient and provably secure RFID grouping proof protocol., , , and . ACSW, page 71:1-71:7. ACM, (2017)Fair Multi-signature., , and . WISA, volume 8909 of Lecture Notes in Computer Science, page 244-256. Springer, (2014)Identity-Based Authenticated Broadcast Encryption and Distributed Authenticated Encryption., , , and . ASIAN, volume 3321 of Lecture Notes in Computer Science, page 169-181. Springer, (2004)A Generic Construction of Dynamic Single Sign-on with Strong Security., , , and . SecureComm, volume 50 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 181-198. Springer, (2010)ID-Based Encryption with Equality Test Against Insider Attack., , , and . ACISP (1), volume 10342 of Lecture Notes in Computer Science, page 168-183. Springer, (2017)One-Round Strong Oblivious Signature-Based Envelope., , , , , and . ACISP (2), volume 9723 of Lecture Notes in Computer Science, page 3-20. Springer, (2016)A New Scheme of Credit based Payment for Electronic Commerce., and . LCN, page 278-284. IEEE Computer Society, (1998)