The following pages link to Rui Zhang (Q744325):
Displaying 44 items.
- Forgeability of Wang-Zhu-Feng-Yau's attribute-based signature with policy-and-endorsement mechanism (Q744326) (← links)
- Tightly secure two-pass authenticated key exchange protocol in the CK model (Q785012) (← links)
- Multipurpose public-key encryption (Q1800832) (← links)
- Fully secure ABE with outsourced decryption against chosen ciphertext attack (Q2057133) (← links)
- An efficient CCA-secure access control encryption for any policy (Q2057135) (← links)
- Distributed key generation for SM9-based systems (Q2057137) (← links)
- Key dependent message security for revocable identity-based encryption and identity-based encryption (Q2218967) (← links)
- Certifying variant of RSA with generalized moduli (Q2218978) (← links)
- Improved bounds for the implicit factorization problem (Q2391412) (← links)
- More efficient construction of anonymous signatures (Q2673068) (← links)
- A Solution of Code Authentication on Android (Q2801780) (← links)
- Towards Optimal Bounds for Implicit Factorization Problem (Q2807227) (← links)
- Solving Linear Equations Modulo Unknown Divisors: Revisited (Q2811131) (← links)
- Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption (Q2890017) (← links)
- Threshold Ciphertext Policy Attribute-Based Encryption with Constant Size Ciphertexts (Q2907383) (← links)
- Deterministic Public Key Encryption and Identity-Based Encryption from Lattices in the Auxiliary-Input Setting (Q2912783) (← links)
- Acquiring Key Privacy from Data Privacy (Q3019937) (← links)
- Constructing Better KEMs with Partial Message Recovery (Q3056904) (← links)
- Efficient Threshold Encryption from Lossy Trapdoor Functions (Q3102790) (← links)
- Reducing Randomness Complexity of Mask Refreshing Algorithm (Q3297482) (← links)
- Generic Construction of Stateful Identity Based Encryption (Q3399215) (← links)
- Simpler CCA-Secure Public Key Encryption from Lossy Trapdoor Functions (Q3454585) (← links)
- Formal Security Treatments for Signatures from Identity-Based Encryption (Q3503884) (← links)
- Relations Among Notions of Security for Identity Based Encryption Schemes (Q3525754) (← links)
- Short Signature and Universal Designated Verifier Signature Without Random Oracles (Q3593169) (← links)
- Orthogonality between Key Privacy and Data Privacy, Revisited (Q3600343) (← links)
- Tweaking TBE/IBE to PKE Transforms with Chameleon Hash Functions (Q3612390) (← links)
- Strong Anonymous Signatures (Q3623072) (← links)
- (Q4640755) (← links)
- Applied Cryptography and Network Security (Q4680972) (← links)
- A Deterministic Algorithm for Computing Divisors in an Interval (Q4683943) (← links)
- A Generic Construction from Selective-IBE to Public-Key Encryption with Non-interactive Opening (Q4899207) (← links)
- Stronger Security Model for Public-Key Encryption with Equality Test (Q4912489) (← links)
- Updatable Hash Proof System and Its Applications (Q5097049) (← links)
- New Partial Key Exposure Attacks on CRT-RSA with Large Public Exponents (Q5168539) (← links)
- Factoring Multi-power RSA Modulus N = p r q with Partial Known Bits (Q5300936) (← links)
- Applied Cryptography and Network Security (Q5443094) (← links)
- Generic Combination of Public Key Encryption with Keyword Search and Public Key Encryption (Q5458498) (← links)
- Efficient Identity-Based Encryption with Tight Security Reduction (Q5502732) (← links)
- An Approach for Mitigating Potential Threats in Practical SSO Systems (Q5740248) (← links)
- Generic Transforms to Acquire CCA-Security for Identity Based Encryption: The Cases of FOpkc and REACT (Q5757693) (← links)
- Information Security and Cryptology (Q5897802) (← links)
- Applied Algebra, Algebraic Algorithms and Error-Correcting Codes (Q5898591) (← links)
- Public Key Cryptography – PKC 2004 (Q5901814) (← links)