Publication | Date of Publication | Type |
---|
Lightweight delegatable proofs of storage | 2022-08-19 | Paper |
Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing | 2020-02-06 | Paper |
Identity-based aggregate signcryption in the standard model from multilinear maps | 2019-01-22 | Paper |
How to protect privacy in optimistic fair exchange of digital signatures | 2018-05-18 | Paper |
Practical Ciphertext-Policy Attribute-Based Encryption: Traitor Tracing, Revocation, and Large Universe | 2016-03-10 | Paper |
Low-Weight Primes for Lightweight Elliptic Curve Cryptography on 8-bit AVR Processors | 2015-12-02 | Paper |
Fully Collusion-Resistant Traceable Key-Policy Attribute-Based Encryption with Sub-linear Size Ciphertexts | 2015-11-25 | Paper |
Ambiguous One-Move Nominative Signature Without Random Oracles | 2015-10-16 | Paper |
Practical (fully) distributed signatures provably secure in the standard model | 2015-07-24 | Paper |
Efficient algorithms for secure outsourcing of bilinear pairings | 2014-12-02 | Paper |
Ambiguous optimistic fair exchange: definition and constructions | 2014-12-02 | Paper |
Concurrent signature without random oracles | 2014-12-02 | Paper |
Extending concurrent signature to multiple parties | 2014-08-27 | Paper |
The construction of ambiguous optimistic fair exchange from designated confirmer signature without random oracles | 2014-08-01 | Paper |
Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts | 2014-06-06 | Paper |
Practical Distributed Signatures in the Standard Model | 2014-03-28 | Paper |
P2OFE: Privacy-Preserving Optimistic Fair Exchange of Digital Signatures | 2014-03-28 | Paper |
Identity based identification from algebraic coding theory | 2014-01-13 | Paper |
Fairness in Concurrent Signatures Revisited | 2013-06-28 | Paper |
A CCA-Secure Identity-Based Conditional Proxy Re-Encryption without Random Oracles | 2013-06-04 | Paper |
Touch Gestures Based Biometric Authentication Scheme for Touchscreen Mobile Phones | 2013-05-28 | Paper |
Short and efficient convertible undeniable signature schemes without random oracles | 2013-04-17 | Paper |
One-Move Convertible Nominative Signature in the Standard Model | 2012-11-06 | Paper |
Generic security-amplifying methods of ordinary digital signatures | 2012-10-17 | Paper |
Generalized First Pre-image Tractable Random Oracle Model and Signature Schemes | 2012-09-07 | Paper |
The Construction of Ambiguous Optimistic Fair Exchange from Designated Confirmer Signature without Random Oracles | 2012-07-20 | Paper |
Group-oriented fair exchange of signatures | 2012-07-13 | Paper |
Fully Secure Multi-authority Ciphertext-Policy Attribute-Based Encryption without Random Oracles | 2011-11-22 | Paper |
Concurrent Signatures with Fully Negotiable Binding Control | 2011-09-16 | Paper |
Short Convertible Undeniable Signature in the Standard Model | 2011-05-19 | Paper |
A New Construction of Designated Confirmer Signature and Its Application to Optimistic Fair Exchange | 2010-11-26 | Paper |
Oblivious Transfer with Access Control : Realizing Disjunction without Duplication | 2010-11-26 | Paper |
A Suite of Non-pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity (Extended Abstract) | 2010-10-12 | Paper |
Efficient Group Signature with Forward Secure Revocation | 2010-04-23 | Paper |
Probabilistic Public Key Encryption with Equality Test | 2010-03-16 | Paper |
Signcryption from randomness recoverable public key encryption | 2010-03-11 | Paper |
Certificateless threshold ring signature | 2009-10-01 | Paper |
Efficient Non-interactive Range Proof | 2009-07-23 | Paper |
On the security of a visual cryptography scheme for color images | 2009-04-03 | Paper |
Generic Transformation to Strongly Unforgeable Signatures | 2009-03-10 | Paper |
A More Natural Way to Construct Identity-Based Identification Schemes | 2009-03-10 | Paper |
On the Relation among Various Security Models for Certificateless Cryptography | 2009-03-09 | Paper |
Generic Certificateless Key Encapsulation Mechanism | 2009-03-06 | Paper |
Certificateless Signature Revisited | 2009-03-06 | Paper |
On the relation among various security models for certificateless cryptography | 2009-02-24 | Paper |
An efficient one-move nominative signature scheme | 2009-02-24 | Paper |
On Secret Reconstruction in Secret Sharing Schemes | 2009-02-24 | Paper |
Ambiguous Optimistic Fair Exchange | 2009-02-10 | Paper |
Two-factor mutual authentication based on smart cards and passwords | 2008-11-19 | Paper |
A new framework for the design and analysis of identity-based identification schemes | 2008-11-18 | Paper |
Traceable and Retrievable Identity-Based Encryption | 2008-06-13 | Paper |
Generic Security-Amplifying Methods of Ordinary Digital Signatures | 2008-06-13 | Paper |
Efficient Optimistic Fair Exchange Secure in the Multi-user Setting and Chosen-Key Model without Random Oracles | 2008-04-24 | Paper |
An Efficient Password-Only Two-Server Authenticated Key Exchange System | 2008-03-25 | Paper |
Formal Definition and Construction of Nominative Signature | 2008-03-25 | Paper |
On the Security Models of (Threshold) Ring Signature Schemes | 2008-03-17 | Paper |
Progress in Cryptology - INDOCRYPT 2003 | 2007-11-29 | Paper |
Efficient Anonymous Roaming and Its Security Analysis | 2007-09-24 | Paper |
Certificateless signature: a new security model and an improved generic construction | 2007-09-20 | Paper |
Key Replacement Attack Against a Generic Construction of Certificateless Signature | 2007-09-07 | Paper |
On the Generic and Efficient Constructions of Secure Designated Confirmer Signatures | 2007-09-04 | Paper |
An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices | 2007-06-13 | Paper |
Public Key Cryptography - PKC 2006 | 2007-05-02 | Paper |
Applied Cryptography and Network Security | 2007-05-02 | Paper |
Information Security and Cryptology - ICISC 2005 | 2007-05-02 | Paper |
Topics in Cryptology – CT-RSA 2006 | 2007-02-12 | Paper |
ENHANCED SECURITY MODELS AND A GENERIC CONSTRUCTION APPROACH FOR LINKABLE RING SIGNATURE | 2007-02-08 | Paper |
Generalised cumulative arrays in secret sharing | 2006-11-22 | Paper |
Information Security | 2006-10-20 | Paper |
RESILIENT LKH: SECURE MULTICAST KEY DISTRIBUTION SCHEMES | 2006-10-16 | Paper |
Information Security and Privacy | 2006-06-22 | Paper |
Information Security and Cryptology - ICISC 2003 | 2005-12-27 | Paper |
Progress in Cryptology - INDOCRYPT 2004 | 2005-12-22 | Paper |
Information Security Practice and Experience | 2005-09-13 | Paper |
Information Security and Privacy | 2005-09-07 | Paper |
https://portal.mardi4nfdi.de/entity/Q4474180 | 2004-08-04 | Paper |
https://portal.mardi4nfdi.de/entity/Q4408431 | 2003-06-29 | Paper |