Zuhua Shao

From MaRDI portal
Person:506781



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Practical verifiably encrypted signatures without random oracles
Information Sciences
2017-02-02Paper
Certificate-based fair exchange protocol of Schnorr signatures in chosen-key model
Fundamenta Informaticae
2016-08-15Paper
Multisignature scheme based on discrete logarithms in the plain public key model2011-12-01Paper
Enhanced certificate-based encryption from pairings
Computers and Electrical Engineering
2011-07-28Paper
Breaking Pomykala-Barabasz threshold proxy signature scheme2011-06-10Paper
Fair exchange protocol of Schnorr signatures with semi-trusted adjudicator
Computers and Electrical Engineering
2010-12-29Paper
Security of self-certified signatures
Information Processing Letters
2010-09-01Paper
Provably secure proxy-protected signature schemes based on RSA
Computers and Electrical Engineering
2009-05-07Paper
Dynamic and efficient joint encryption scheme in the plain public key model
Computers and Electrical Engineering
2009-04-17Paper
Cryptanalysis of ``an identity-based society oriented signature scheme with anonymous signers
Information Processing Letters
2009-03-23Paper
Certificate-based fair exchange protocol of signatures from pairings
Computer Networks
2009-01-20Paper
Certificate-based verifiably encrypted signatures from pairings
Information Sciences
2008-05-19Paper
Self-certified Signatures Based on Discrete Logarithms
Arithmetic of Finite Fields
2007-11-15Paper
A provably secure short signature scheme based on discrete logarithms
Information Sciences
2007-10-18Paper
scientific article; zbMATH DE number 5140763 (Why is no real title available?)2007-04-05Paper
Information Security and Cryptology
Lecture Notes in Computer Science
2006-11-14Paper
Security of the design of time-stamped signatures
Journal of Computer and System Sciences
2006-06-30Paper
Security of meta-He digital signature scheme based on factoring and discrete logarithms
Applied Mathematics and Computation
2005-11-22Paper
Improvement of efficient proxy signature schemes using self-certified public keys
Applied Mathematics and Computation
2005-11-04Paper
A new key authentication scheme for cryptosystems based on discrete logarithms
Applied Mathematics and Computation
2005-10-28Paper
Security of a new digital signature scheme based on factoring and discrete logarithms
International Journal of Computer Mathematics
2005-10-27Paper
Improvement of digital signature with message recovery using self-certified public keys and its variants
Applied Mathematics and Computation
2005-01-17Paper
Proxy signature schemes based on factoring
Information Processing Letters
2003-01-22Paper
Public-key cryptosystem over ring Z∣√−3∣/(2m)
Electronics Letters
1988-01-01Paper


Research outcomes over time


This page was built for person: Zuhua Shao