Publication | Date of Publication | Type |
---|
Controllable forward secure identity-based encryption with equality test in privacy-preserving text similarity analysis | 2024-03-20 | Paper |
A fully secure lattice-based signcryption with designated equality test in standard model | 2024-02-13 | Paper |
A novel quantum private set intersection scheme with a semi-honest third party | 2024-01-16 | Paper |
Hierarchical identity-based inner product functional encryption | 2023-12-11 | Paper |
Abelian Hearts of Twin Cotorsion Pairs on Extriangulated Categories | 2023-09-08 | Paper |
\textit{CCOM}: cost-efficient and collusion-resistant oracle mechanism for smart contracts | 2023-07-26 | Paper |
High-order orthogonal spline collocation ADI scheme for a new complex two-dimensional distributed-order fractional integro-differential equation with two weakly singular kernels | 2023-07-03 | Paper |
Public key encryption with fuzzy matching | 2023-04-13 | Paper |
A CCA-full-anonymous group signature with verifiable controllable linkability in the standard model | 2023-04-13 | Paper |
The efficient alternating direction implicit Galerkin method for the nonlocal diffusion-wave equation in three dimensions | 2022-10-06 | Paper |
A novel identity-based multi-signature scheme over NTRU lattices | 2022-09-27 | Paper |
Plaintext-checkable encryption with unlink-CCA security in the standard model | 2022-08-30 | Paper |
A Novel Certificateless Multi-signature Scheme over NTRU Lattices | 2022-08-11 | Paper |
Privacy-preserving polynomial interpolation and its applications on predictive analysis | 2021-11-30 | Paper |
Secure three-party semi-quantum summation using single photons | 2021-11-05 | Paper |
Public-key authenticated encryption with keyword search revisited: security model and constructions | 2021-03-31 | Paper |
Leakage-resilient group signature: definitions and constructions | 2021-03-18 | Paper |
Group public key encryption with equality test against offline message recovery attack | 2021-03-18 | Paper |
On C¯-extensions and balanced pairs | 2020-09-03 | Paper |
切换正系统的渐近稳定性、L1增益及时变H∞控制 | 2020-08-12 | Paper |
Constant-size ciphertexts in threshold attribute-based encryption without dummy attributes | 2020-07-20 | Paper |
Black-box constructions of signature schemes in the bounded leakage setting | 2020-07-16 | Paper |
Group ID-based encryption with equality test | 2020-05-27 | Paper |
An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks | 2020-02-07 | Paper |
Towards enhanced security for certificateless public-key authenticated encryption with keyword search | 2020-01-10 | Paper |
Plaintext-verifiably-checkable encryption | 2020-01-10 | Paper |
Multi-party quantum summation with a single d-level quantum system | 2019-11-06 | Paper |
Outsourced ciphertext-policy attribute-based encryption with equality test | 2019-10-31 | Paper |
Control of the fractional-order Chen chaotic system via fractional-order scalar controller and its circuit implementation | 2019-02-08 | Paper |
Leakage-resilient ring signature schemes | 2019-01-18 | Paper |
How to protect privacy in optimistic fair exchange of digital signatures | 2018-05-18 | Paper |
A Black-Box Construction of Strongly Unforgeable Signature Scheme in the Leakage Setting | 2018-02-23 | Paper |
Multi-party quantum summation without a trusted third party based on single particles | 2017-10-20 | Paper |
Efficient Multicast Key Distribution Using HOWP-Based Dynamic Group Access Structures | 2017-07-12 | Paper |
https://portal.mardi4nfdi.de/entity/Q2987642 | 2017-05-17 | Paper |
A Black-Box Construction of Strongly Unforgeable Signature Schemes in the Bounded Leakage Model | 2017-01-06 | Paper |
https://portal.mardi4nfdi.de/entity/Q2823715 | 2016-10-06 | Paper |
Ambiguous One-Move Nominative Signature Without Random Oracles | 2015-10-16 | Paper |
Ambiguous optimistic fair exchange: definition and constructions | 2014-12-02 | Paper |
Concurrent signature without random oracles | 2014-12-02 | Paper |
Extending concurrent signature to multiple parties | 2014-08-27 | Paper |
The construction of ambiguous optimistic fair exchange from designated confirmer signature without random oracles | 2014-08-01 | Paper |
Sakai-Ohgishi-Kasahara Identity-Based Non-Interactive Key Exchange Scheme, Revisited | 2014-07-24 | Paper |
New delay-dependent stability analysis for fuzzy time-delay interconnected systems | 2014-04-15 | Paper |
P2OFE: Privacy-Preserving Optimistic Fair Exchange of Digital Signatures | 2014-03-28 | Paper |
Short and efficient convertible undeniable signature schemes without random oracles | 2013-04-17 | Paper |
The Construction of Ambiguous Optimistic Fair Exchange from Designated Confirmer Signature without Random Oracles | 2012-07-20 | Paper |
Group-oriented fair exchange of signatures | 2012-07-13 | Paper |
Fully Secure Multi-authority Ciphertext-Policy Attribute-Based Encryption without Random Oracles | 2011-11-22 | Paper |
Concurrent Signatures with Fully Negotiable Binding Control | 2011-09-16 | Paper |
Short Convertible Undeniable Signature in the Standard Model | 2011-05-19 | Paper |
A New Construction of Designated Confirmer Signature and Its Application to Optimistic Fair Exchange | 2010-11-26 | Paper |
Oblivious Transfer with Access Control : Realizing Disjunction without Duplication | 2010-11-26 | Paper |
Escrowed Deniable Identification Schemes | 2010-04-23 | Paper |
Probabilistic Public Key Encryption with Equality Test | 2010-03-16 | Paper |
Efficient Non-interactive Range Proof | 2009-07-23 | Paper |
Generic Transformation to Strongly Unforgeable Signatures | 2009-03-10 | Paper |
On the Relation among Various Security Models for Certificateless Cryptography | 2009-03-09 | Paper |
Generic Certificateless Key Encapsulation Mechanism | 2009-03-06 | Paper |
On the relation among various security models for certificateless cryptography | 2009-02-24 | Paper |
Efficient lattice-based signature scheme | 2009-02-24 | Paper |
An efficient one-move nominative signature scheme | 2009-02-24 | Paper |
Ambiguous Optimistic Fair Exchange | 2009-02-10 | Paper |
Traceable and Retrievable Identity-Based Encryption | 2008-06-13 | Paper |
Efficient Optimistic Fair Exchange Secure in the Multi-user Setting and Chosen-Key Model without Random Oracles | 2008-04-24 | Paper |
Formal Definition and Construction of Nominative Signature | 2008-03-25 | Paper |