The following pages link to Debiao He (Q356083):
Displaying 28 items.
- An efficient certificateless two-party authenticated key agreement protocol (Q356085) (← links)
- A new two-round certificateless authenticated key agreement protocol without bilinear pairings (Q410068) (← links)
- An ID-based three-party authenticated key exchange protocol using elliptic curve cryptography for mobile-commerce environments (Q458506) (← links)
- On Diophantine equation \(3a^2x^4 - By^2 = 1\) (Q711464) (← links)
- Insecurity of an efficient certificateless aggregate signature with constant pairing computations (Q726166) (← links)
- An efficient and secure searchable public key encryption scheme with privacy protection for cloud storage (Q1626271) (← links)
- Provable secure and efficient digital rights management authentication scheme using smart card based on elliptic curve cryptography (Q1666610) (← links)
- Succinct multi-authority attribute-based access control for circuits with authenticated outsourcing (Q1701978) (← links)
- Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing (Q1703692) (← links)
- Privacy-preserving certificateless provable data possession scheme for big data storage on cloud (Q1740079) (← links)
- Cryptanalysis of a communication-efficient three-party password authenticated key exchange protocol (Q1761614) (← links)
- Fuzzy matching and direct revocation: a new CP-ABE scheme from multilinear maps (Q1797829) (← links)
- Attribute-based fuzzy identity access control in multicloud computing environments (Q1800244) (← links)
- Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol (Q1928988) (← links)
- Note on: ``Design of improved password authentication and update scheme based on elliptic curve cryptography'' (Q1933943) (← links)
- An efficient identity-based blind signature scheme without bilinear pairings (Q1952512) (← links)
- An efficient blind signature scheme based on SM2 signature algorithm (Q2057164) (← links)
- Improved secure fuzzy auditing protocol for cloud data storage (Q2317638) (← links)
- A general compiler for password-authenticated group key exchange protocol in the standard model (Q2413217) (← links)
- An efficient certificateless proxy signature scheme without pairing (Q2450489) (← links)
- Blockchain-based system for secure outsourcing of bilinear pairings (Q2663527) (← links)
- A practical NIZK argument for confidential transactions over account-model blockchain (Q2692322) (← links)
- Provably Secure Threshold Paillier Encryption Based on Hyperplane Geometry (Q2817804) (← links)
- (Q3403234) (← links)
- (Q4640753) (← links)
- Pairing-Free Identity-Based Encryption with Authorized Equality Test in Online Social Networks (Q5205022) (← links)
- Proxy Provable Data Possession with General Access Structure in Public Clouds (Q5740253) (← links)
- On the Niho Type Locally-APN Power Functions and Their Boomerang Spectrum (Q6199216) (← links)