| Publication | Date of Publication | Type |
|---|
| Lightweight delegatable proofs of storage | 2022-08-19 | Paper |
Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing Information Sciences | 2020-02-06 | Paper |
Identity-based aggregate signcryption in the standard model from multilinear maps Frontiers of Computer Science | 2019-01-22 | Paper |
How to protect privacy in optimistic fair exchange of digital signatures Information Sciences | 2018-05-18 | Paper |
Practical ciphertext-policy attribute-based encryption: traitor tracing, revocation, and large universe Applied Cryptography and Network Security | 2016-03-10 | Paper |
Low-weight primes for lightweight elliptic curve cryptography on 8-bit AVR processors Information Security and Cryptology | 2015-12-02 | Paper |
Fully collusion-resistant traceable key-policy attribute-based encryption with sub-linear size ciphertexts Information Security and Cryptology | 2015-11-25 | Paper |
Ambiguous one-move nominative signature without random oracles Information Security and Cryptology -- ICISC 2013 | 2015-10-16 | Paper |
Practical (fully) distributed signatures provably secure in the standard model Theoretical Computer Science | 2015-07-24 | Paper |
Efficient algorithms for secure outsourcing of bilinear pairings Theoretical Computer Science | 2014-12-02 | Paper |
Ambiguous optimistic fair exchange: definition and constructions Theoretical Computer Science | 2014-12-02 | Paper |
Concurrent signature without random oracles Theoretical Computer Science | 2014-12-02 | Paper |
Extending concurrent signature to multiple parties Theoretical Computer Science | 2014-08-27 | Paper |
The construction of ambiguous optimistic fair exchange from designated confirmer signature without random oracles Information Sciences | 2014-08-01 | Paper |
Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts Theoretical Computer Science | 2014-06-06 | Paper |
P\(^2\)OFE: privacy-preserving optimistic fair exchange of digital signatures Topics in Cryptology – CT-RSA 2014 | 2014-03-28 | Paper |
Practical distributed signatures in the standard model Topics in Cryptology – CT-RSA 2014 | 2014-03-28 | Paper |
Identity based identification from algebraic coding theory Theoretical Computer Science | 2014-01-13 | Paper |
Fairness in concurrent signatures revisited Information Security and Privacy | 2013-06-28 | Paper |
A CCA-secure identity-based conditional proxy re-encryption without random oracles Lecture Notes in Computer Science | 2013-06-04 | Paper |
Touch gestures based biometric authentication scheme for touchscreen mobile phones Information Security and Cryptology | 2013-05-28 | Paper |
Short and efficient convertible undeniable signature schemes without random oracles Theoretical Computer Science | 2013-04-17 | Paper |
One-move convertible nominative signature in the standard model Provable Security | 2012-11-06 | Paper |
Generic security-amplifying methods of ordinary digital signatures Information Sciences | 2012-10-17 | Paper |
Generalized First Pre-image Tractable Random Oracle Model and Signature Schemes Information Security and Privacy | 2012-09-07 | Paper |
The Construction of Ambiguous Optimistic Fair Exchange from Designated Confirmer Signature without Random Oracles Public Key Cryptography – PKC 2012 | 2012-07-20 | Paper |
Group-oriented fair exchange of signatures Information Sciences | 2012-07-13 | Paper |
Fully secure multi-authority ciphertext-policy attribute-based encryption without random oracles Computer Security – ESORICS 2011 | 2011-11-22 | Paper |
Concurrent signatures with fully negotiable binding control Provable Security | 2011-09-16 | Paper |
Short Convertible Undeniable Signature in the Standard Model Information Security Practice and Experience | 2011-05-19 | Paper |
Oblivious transfer with access control: realizing disjunction without duplication Lecture Notes in Computer Science | 2010-11-26 | Paper |
A New Construction of Designated Confirmer Signature and Its Application to Optimistic Fair Exchange Lecture Notes in Computer Science | 2010-11-26 | Paper |
A Suite of Non-pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity (Extended Abstract) Provable Security | 2010-10-12 | Paper |
Efficient Group Signature with Forward Secure Revocation Security Technology | 2010-04-23 | Paper |
Probabilistic public key encryption with equality test Topics in Cryptology - CT-RSA 2010 | 2010-03-16 | Paper |
Signcryption from randomness recoverable public key encryption Information Sciences | 2010-03-11 | Paper |
Certificateless threshold ring signature Information Sciences | 2009-10-01 | Paper |
Efficient Non-interactive Range Proof Lecture Notes in Computer Science | 2009-07-23 | Paper |
On the security of a visual cryptography scheme for color images Pattern Recognition | 2009-04-03 | Paper |
Generic Transformation to Strongly Unforgeable Signatures Applied Cryptography and Network Security | 2009-03-10 | Paper |
A More Natural Way to Construct Identity-Based Identification Schemes Applied Cryptography and Network Security | 2009-03-10 | Paper |
On the Relation among Various Security Models for Certificateless Cryptography Coding and Cryptology | 2009-03-09 | Paper |
Certificateless Signature Revisited Information Security and Privacy | 2009-03-06 | Paper |
Generic Certificateless Key Encapsulation Mechanism Information Security and Privacy | 2009-03-06 | Paper |
On the relation among various security models for certificateless cryptography International Journal of Applied Cryptography | 2009-02-24 | Paper |
On Secret Reconstruction in Secret Sharing Schemes IEEE Transactions on Information Theory | 2009-02-24 | Paper |
An efficient one-move nominative signature scheme International Journal of Applied Cryptography | 2009-02-24 | Paper |
Ambiguous Optimistic Fair Exchange Advances in Cryptology - ASIACRYPT 2008 | 2009-02-10 | Paper |
Two-factor mutual authentication based on smart cards and passwords Journal of Computer and System Sciences | 2008-11-19 | Paper |
A new framework for the design and analysis of identity-based identification schemes Theoretical Computer Science | 2008-11-18 | Paper |
Traceable and Retrievable Identity-Based Encryption Applied Cryptography and Network Security | 2008-06-13 | Paper |
Generic Security-Amplifying Methods of Ordinary Digital Signatures Applied Cryptography and Network Security | 2008-06-13 | Paper |
Efficient Optimistic Fair Exchange Secure in the Multi-user Setting and Chosen-Key Model without Random Oracles Topics in Cryptology – CT-RSA 2008 | 2008-04-24 | Paper |
An Efficient Password-Only Two-Server Authenticated Key Exchange System Information and Communications Security | 2008-03-25 | Paper |
Formal Definition and Construction of Nominative Signature Information and Communications Security | 2008-03-25 | Paper |
On the Security Models of (Threshold) Ring Signature Schemes Lecture Notes in Computer Science | 2008-03-17 | Paper |
Progress in Cryptology - INDOCRYPT 2003 Lecture Notes in Computer Science | 2007-11-29 | Paper |
Efficient Anonymous Roaming and Its Security Analysis Applied Cryptography and Network Security | 2007-09-24 | Paper |
Certificateless signature: a new security model and an improved generic construction Designs, Codes and Cryptography | 2007-09-20 | Paper |
Key Replacement Attack Against a Generic Construction of Certificateless Signature Information Security and Privacy | 2007-09-07 | Paper |
On the Generic and Efficient Constructions of Secure Designated Confirmer Signatures Public Key Cryptography – PKC 2007 | 2007-09-04 | Paper |
An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices Theoretical Computer Science | 2007-06-13 | Paper |
Applied Cryptography and Network Security Lecture Notes in Computer Science | 2007-05-02 | Paper |
Public Key Cryptography - PKC 2006 Lecture Notes in Computer Science | 2007-05-02 | Paper |
Information Security and Cryptology - ICISC 2005 Lecture Notes in Computer Science | 2007-05-02 | Paper |
Topics in Cryptology – CT-RSA 2006 Lecture Notes in Computer Science | 2007-02-12 | Paper |
ENHANCED SECURITY MODELS AND A GENERIC CONSTRUCTION APPROACH FOR LINKABLE RING SIGNATURE International Journal of Foundations of Computer Science | 2007-02-08 | Paper |
Generalised cumulative arrays in secret sharing Designs, Codes and Cryptography | 2006-11-22 | Paper |
Information Security Lecture Notes in Computer Science | 2006-10-20 | Paper |
RESILIENT LKH: SECURE MULTICAST KEY DISTRIBUTION SCHEMES International Journal of Foundations of Computer Science | 2006-10-16 | Paper |
Information Security and Privacy Lecture Notes in Computer Science | 2006-06-22 | Paper |
Information Security and Cryptology - ICISC 2003 Lecture Notes in Computer Science | 2005-12-27 | Paper |
Progress in Cryptology - INDOCRYPT 2004 Lecture Notes in Computer Science | 2005-12-22 | Paper |
Information Security Practice and Experience Lecture Notes in Computer Science | 2005-09-13 | Paper |
Information Security and Privacy Lecture Notes in Computer Science | 2005-09-07 | Paper |
| scientific article; zbMATH DE number 2081071 (Why is no real title available?) | 2004-08-04 | Paper |
| scientific article; zbMATH DE number 1941235 (Why is no real title available?) | 2003-06-29 | Paper |