Author of the publication

Lattice-Based Threshold, Accountable, and Private Signature.

, , , and . CT-RSA, volume 14643 of Lecture Notes in Computer Science, page 249-274. Springer, (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient Construction for Full Black-Box Accountable Authority Identity-Based Encryption., , , , , and . IEEE Access, (2019)Privacy-preserving COVID-19 contact tracing solution based on blockchain., , , and . Comput. Stand. Interfaces, (2023)Privacy-Preserving Classification Scheme Based on Support Vector Machine., , , , , and . IEEE Syst. J., 16 (4): 5906-5916 (2022)Accountable authority identity-based broadcast encryption with constant-size private keys and ciphertexts., , , , , and . Theor. Comput. Sci., (2020)Traceable-then-revocable ciphertext-policy attribute-based encryption scheme., , , and . Future Gener. Comput. Syst., (2019)Communication-Efficient and Privacy-Preserving Verifiable Aggregation for Federated Learning., , , , and . Entropy, 25 (8): 1125 (August 2023)Allocating Rotational Cryptanalysis based Preimage Attack on 4-round Keccak-224 for Quantum Setting., , , , and . IACR Cryptol. ePrint Arch., (2022)Cryptanalysis of a Certificateless Aggregate Signature Scheme for Healthcare Wireless Sensor Network., and . Secur. Commun. Networks, (2019)Cryptanalysis of a Knapsack Public Key Cryptosystem., , and . IAS, page 49-52. IEEE Computer Society, (2009)A Refined Hardness Estimation of LWE in Two-Step Mode., , , , and . Public Key Cryptography (3), volume 14603 of Lecture Notes in Computer Science, page 3-35. Springer, (2024)