| Publication | Date of Publication | Type |
|---|
| Public-key encryption with keyword search in multi-user, multi-challenge setting under adaptive corruptions | 2024-11-12 | Paper |
| Verifiable multi-party quantum secret sharing based on GHZ states | 2024-07-29 | Paper |
| Forward secure online/offline key policy attribute-based encryption with keyword search | 2024-07-19 | Paper |
| Public key authenticated encryption with keyword search improved: strong security model and multi-keyword construction | 2024-07-17 | Paper |
| Secure three-party quantum summation based on W-class states | 2024-07-10 | Paper |
| Numerical analysis of temporal second-order accurate scheme for the abstract Volterra integrodifferential equation | 2024-05-24 | Paper |
| Controllable forward secure identity-based encryption with equality test in privacy-preserving text similarity analysis | 2024-03-20 | Paper |
| A fully secure lattice-based signcryption with designated equality test in standard model | 2024-02-13 | Paper |
| A novel quantum private set intersection scheme with a semi-honest third party | 2024-01-16 | Paper |
| Hierarchical identity-based inner product functional encryption | 2023-12-11 | Paper |
| Abelian Hearts of Twin Cotorsion Pairs on Extriangulated Categories | 2023-09-08 | Paper |
| \textit{CCOM}: cost-efficient and collusion-resistant oracle mechanism for smart contracts | 2023-07-26 | Paper |
| High-order orthogonal spline collocation ADI scheme for a new complex two-dimensional distributed-order fractional integro-differential equation with two weakly singular kernels | 2023-07-03 | Paper |
| A CCA-full-anonymous group signature with verifiable controllable linkability in the standard model | 2023-04-13 | Paper |
| Public key encryption with fuzzy matching | 2023-04-13 | Paper |
| Broadcast Authenticated Encryption with Keyword Search | 2023-04-13 | Paper |
| The efficient alternating direction implicit Galerkin method for the nonlocal diffusion-wave equation in three dimensions | 2022-10-06 | Paper |
| A novel identity-based multi-signature scheme over NTRU lattices | 2022-09-27 | Paper |
| Plaintext-checkable encryption with unlink-CCA security in the standard model | 2022-08-30 | Paper |
| A Novel Certificateless Multi-signature Scheme over NTRU Lattices | 2022-08-11 | Paper |
| Privacy-preserving polynomial interpolation and its applications on predictive analysis | 2021-11-30 | Paper |
| Secure three-party semi-quantum summation using single photons | 2021-11-05 | Paper |
| Public-key authenticated encryption with keyword search revisited: security model and constructions | 2021-03-31 | Paper |
| Leakage-resilient group signature: definitions and constructions | 2021-03-18 | Paper |
| Group public key encryption with equality test against offline message recovery attack | 2021-03-18 | Paper |
| On C¯-extensions and balanced pairs | 2020-09-03 | Paper |
| 切换正系统的渐近稳定性、L1增益及时变H∞控制 | 2020-08-12 | Paper |
| Constant-size ciphertexts in threshold attribute-based encryption without dummy attributes | 2020-07-20 | Paper |
| Black-box constructions of signature schemes in the bounded leakage setting | 2020-07-16 | Paper |
| Group ID-based encryption with equality test | 2020-05-27 | Paper |
| An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks | 2020-02-07 | Paper |
| Plaintext-verifiably-checkable encryption | 2020-01-10 | Paper |
| Towards enhanced security for certificateless public-key authenticated encryption with keyword search | 2020-01-10 | Paper |
| Multi-party quantum summation with a single d-level quantum system | 2019-11-06 | Paper |
| Outsourced ciphertext-policy attribute-based encryption with equality test | 2019-10-31 | Paper |
| Control of the fractional-order Chen chaotic system via fractional-order scalar controller and its circuit implementation | 2019-02-08 | Paper |
| Leakage-resilient ring signature schemes | 2019-01-18 | Paper |
| How to protect privacy in optimistic fair exchange of digital signatures | 2018-05-18 | Paper |
| A Black-Box Construction of Strongly Unforgeable Signature Scheme in the Leakage Setting | 2018-02-23 | Paper |
| Multi-party quantum summation without a trusted third party based on single particles | 2017-10-20 | Paper |
| Efficient Multicast Key Distribution Using HOWP-Based Dynamic Group Access Structures | 2017-07-12 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2987642 | 2017-05-17 | Paper |
| A Black-Box Construction of Strongly Unforgeable Signature Schemes in the Bounded Leakage Model | 2017-01-06 | Paper |
| Subnormal subgroups and \(p\)-super solvability of finite groups | 2016-10-06 | Paper |
| Ambiguous One-Move Nominative Signature Without Random Oracles | 2015-10-16 | Paper |
| Ambiguous optimistic fair exchange: definition and constructions | 2014-12-02 | Paper |
| Concurrent signature without random oracles | 2014-12-02 | Paper |
| Extending concurrent signature to multiple parties | 2014-08-27 | Paper |
| The construction of ambiguous optimistic fair exchange from designated confirmer signature without random oracles | 2014-08-01 | Paper |
| Sakai-Ohgishi-Kasahara Identity-Based Non-Interactive Key Exchange Scheme, Revisited | 2014-07-24 | Paper |
| New delay-dependent stability analysis for fuzzy time-delay interconnected systems | 2014-04-15 | Paper |
| P2OFE: Privacy-Preserving Optimistic Fair Exchange of Digital Signatures | 2014-03-28 | Paper |
| Short and efficient convertible undeniable signature schemes without random oracles | 2013-04-17 | Paper |
| The Construction of Ambiguous Optimistic Fair Exchange from Designated Confirmer Signature without Random Oracles | 2012-07-20 | Paper |
| Group-oriented fair exchange of signatures | 2012-07-13 | Paper |
| Fully Secure Multi-authority Ciphertext-Policy Attribute-Based Encryption without Random Oracles | 2011-11-22 | Paper |
| Concurrent Signatures with Fully Negotiable Binding Control | 2011-09-16 | Paper |
| Short Convertible Undeniable Signature in the Standard Model | 2011-05-19 | Paper |
| Oblivious Transfer with Access Control : Realizing Disjunction without Duplication | 2010-11-26 | Paper |
| A New Construction of Designated Confirmer Signature and Its Application to Optimistic Fair Exchange | 2010-11-26 | Paper |
| Escrowed Deniable Identification Schemes | 2010-04-23 | Paper |
| Probabilistic Public Key Encryption with Equality Test | 2010-03-16 | Paper |
| Efficient Non-interactive Range Proof | 2009-07-23 | Paper |
| Generic Transformation to Strongly Unforgeable Signatures | 2009-03-10 | Paper |
| On the Relation among Various Security Models for Certificateless Cryptography | 2009-03-09 | Paper |
| Generic Certificateless Key Encapsulation Mechanism | 2009-03-06 | Paper |
| On the relation among various security models for certificateless cryptography | 2009-02-24 | Paper |
| Efficient lattice-based signature scheme | 2009-02-24 | Paper |
| An efficient one-move nominative signature scheme | 2009-02-24 | Paper |
| Ambiguous Optimistic Fair Exchange | 2009-02-10 | Paper |
| Traceable and Retrievable Identity-Based Encryption | 2008-06-13 | Paper |
| Efficient Optimistic Fair Exchange Secure in the Multi-user Setting and Chosen-Key Model without Random Oracles | 2008-04-24 | Paper |
| Formal Definition and Construction of Nominative Signature | 2008-03-25 | Paper |