Publication | Date of Publication | Type |
---|
Design theory and method of multivariate hash function | 2022-10-28 | Paper |
A paid message forwarding scheme based on social network | 2021-12-08 | Paper |
Modeling of the transient cerebrospinal fluid flow under external impacts | 2021-12-01 | Paper |
Traceable ring signatures: general framework and post-quantum security | 2021-06-23 | Paper |
Secure server-aided data sharing clique with attestation | 2021-04-19 | Paper |
Flexible attribute-based proxy re-encryption for efficient data sharing | 2021-03-18 | Paper |
Traceable ring signatures with post-quantum security | 2020-08-05 | Paper |
A practical lattice-based sequential aggregate signature | 2020-01-10 | Paper |
On the study of fluid flow in a soft porous media using a scaled-up indenter | 2019-06-26 | Paper |
Batch blind signatures on elliptic curves | 2018-12-07 | Paper |
Efficient subtree-based encryption for fuzzy-entity data sharing | 2018-11-27 | Paper |
Provably secure self-extractable encryption | 2018-11-07 | Paper |
Verifiably encrypted group signatures | 2018-11-07 | Paper |
Linkable group signature for auditing anonymous communication | 2018-09-26 | Paper |
Auditable hierarchy-private public-key encryption | 2018-09-26 | Paper |
Predicate fully homomorphic encryption: achieving fine-grained access control over manipulable ciphertext | 2018-04-20 | Paper |
A position-aware Merkle tree for dynamic cloud data integrity verification | 2018-02-27 | Paper |
Confidentiality-Preserving Publicly Verifiable Computation | 2018-02-23 | Paper |
Dynamic searchable symmetric encryption with physical deletion and small leakage | 2017-08-25 | Paper |
Public-Key Encryption with Fuzzy Keyword Search: A Provably Secure Scheme under Keyword Guessing Attack | 2017-07-12 | Paper |
DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments | 2017-05-16 | Paper |
Privacy-Preserving Vehicular Communication Authentication with Hierarchical Aggregation and Fast Response | 2017-05-16 | Paper |
Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts | 2017-05-16 | Paper |
Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud Email | 2017-05-16 | Paper |
Towards Certificate-Based Group Encryption | 2017-01-06 | Paper |
Identity-Based Group Encryption | 2016-09-02 | Paper |
Accelerating Oblivious Transfer with Batch Multi-exponentiation | 2016-08-31 | Paper |
Towards Efficient Fully Randomized Message-Locked Encryption | 2016-08-31 | Paper |
Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts | 2016-07-11 | Paper |
Signatures in hierarchical certificateless cryptography: efficient constructions and provable security | 2016-07-08 | Paper |
Secure One-to-Group Communications Escrow-Free ID-Based Asymmetric Group Key Agreement | 2015-12-02 | Paper |
https://portal.mardi4nfdi.de/entity/Q5500915 | 2015-08-10 | Paper |
Practical Direct Chosen Ciphertext Secure Key-Policy Attribute-Based Encryption with Public Ciphertext Test | 2015-07-27 | Paper |
Practical (fully) distributed signatures provably secure in the standard model | 2015-07-24 | Paper |
Hierarchical Identity-Based Broadcast Encryption | 2014-07-24 | Paper |
Practical Distributed Signatures in the Standard Model | 2014-03-28 | Paper |
Provably secure threshold public-key encryption with adaptive security and short ciphertexts | 2012-10-25 | Paper |
Provably secure one-round identity-based authenticated asymmetric group key agreement protocol | 2012-07-13 | Paper |
Delegation of signing rights using certificateless proxy signatures | 2012-06-08 | Paper |
Bridging Broadcast Encryption and Group Key Agreement | 2011-12-02 | Paper |
Fully Distributed Broadcast Encryption | 2011-09-16 | Paper |
https://portal.mardi4nfdi.de/entity/Q3016679 | 2011-07-19 | Paper |
New receipt-free voting scheme using double-trapdoor commitment | 2011-06-17 | Paper |
Threshold Public-Key Encryption with Adaptive Security and Short Ciphertexts | 2010-12-17 | Paper |
Efficient many-to-one authentication with certificateless aggregate signatures | 2010-11-25 | Paper |
Identity-Based Authenticated Asymmetric Group Key Agreement Protocol | 2010-07-20 | Paper |
Simulatable certificateless two-party authenticated key agreement protocol | 2010-03-11 | Paper |
Novel Efficient Certificateless Aggregate Signatures | 2010-01-14 | Paper |
Identity-Based Verifiably Encrypted Signatures without Random Oracles | 2009-12-11 | Paper |
Asymmetric Group Key Agreement | 2009-05-12 | Paper |
Publicly Verifiable Privacy-Preserving Group Decryption | 2009-04-29 | Paper |
Privacy for Private Key in Signatures | 2009-04-29 | Paper |
Concurrent Signatures without a Conventional Keystone | 2009-03-09 | Paper |
Efficient Partially Blind Signatures with Provable Security | 2009-02-10 | Paper |
https://portal.mardi4nfdi.de/entity/Q3537227 | 2008-11-24 | Paper |
Compact E-Cash from Bounded Accumulator | 2008-04-17 | Paper |
A knapsack-based probabilistic encryption scheme | 2007-10-10 | Paper |
Information Security and Cryptology - ICISC 2005 | 2007-05-02 | Paper |
Information Security | 2006-10-16 | Paper |
https://portal.mardi4nfdi.de/entity/Q5715556 | 2006-01-03 | Paper |
Information Security Practice and Experience | 2005-09-13 | Paper |