| Publication | Date of Publication | Type |
|---|
An alternative model of quantum key agreement via photon coupling | 2024-07-11 | Paper |
Provably secure group authentication in the asynchronous communication model | 2024-04-19 | Paper |
Structured encryption for knowledge graphs Information Sciences | 2024-03-07 | Paper |
Practical and malicious private set intersection with improved efficiency Theoretical Computer Science | 2024-03-01 | Paper |
Leakage-resilient identity-based cryptography from minimal assumptions Designs, Codes and Cryptography | 2023-11-07 | Paper |
Efficient Traceable Oblivious Transfer and Its Applications Information Security Practice and Experience | 2023-06-30 | Paper |
An Efficient and Provably Secure Private Polynomial Evaluation Scheme Information Security Practice and Experience | 2023-06-30 | Paper |
Group-Based Source-Destination Verifiable Encryption with Blacklist Checking Information Security Practice and Experience | 2022-12-09 | Paper |
Novel generic construction of leakage-resilient PKE scheme with CCA security Designs, Codes and Cryptography | 2021-06-24 | Paper |
Improvement of attribute-based encryption using Blakley secret sharing | 2021-06-08 | Paper |
Privacy-enhanced remote data integrity checking with updatable timestamp Information Sciences | 2021-04-19 | Paper |
Revocable attribute-based encryption with decryption key exposure resistance and ciphertext delegation Information Sciences | 2020-10-07 | Paper |
Identity-based revocation system: enhanced security model and scalable bounded IBRS construction with short parameters Information Sciences | 2020-09-22 | Paper |
Privacy-enhanced attribute-based private information retrieval Information Sciences | 2020-09-08 | Paper |
Witness-based searchable encryption Information Sciences | 2020-09-08 | Paper |
A code-based signature scheme from the Lyubashevsky framework Theoretical Computer Science | 2020-08-17 | Paper |
A generic scheme of plaintext-checkable database encryption Information Sciences | 2020-07-20 | Paper |
Revocable identity-based encryption with server-aided ciphertext evolution Theoretical Computer Science | 2020-04-06 | Paper |
Identity-based encryption with leakage-amplified chosen-ciphertext attacks security Theoretical Computer Science | 2020-01-29 | Paper |
Provably secure proactive secret sharing without the adjacent assumption | 2020-01-10 | Paper |
Quantum private set intersection cardinality and its application to anonymous authentication Information Sciences | 2020-01-06 | Paper |
Novel updatable identity-based hash proof system and its applications Theoretical Computer Science | 2019-12-27 | Paper |
ACE with compact ciphertext size and decentralized sanitizers International Journal of Foundations of Computer Science | 2019-12-10 | Paper |
Provably secure (broadcast) homomorphic signcryption International Journal of Foundations of Computer Science | 2019-12-10 | Paper |
Strongly leakage resilient authenticated key exchange, revisited Designs, Codes and Cryptography | 2019-11-07 | Paper |
Continuous leakage-resilient identity-based encryption with leakage amplification Designs, Codes and Cryptography | 2019-09-12 | Paper |
The generic construction of continuous leakage-resilient identity-based cryptosystems Theoretical Computer Science | 2019-05-17 | Paper |
Efficient identity-based broadcast encryption with keyword search against insider attacks for database systems Theoretical Computer Science | 2019-03-26 | Paper |
A privacy preserving source verifiable encryption scheme | 2018-12-07 | Paper |
Efficient attribute-based encryption with blackbox traceability | 2018-11-07 | Paper |
Deniable ring authentication based on projective hash functions | 2018-11-07 | Paper |
Provably secure homomorphic signcryption | 2018-11-07 | Paper |
Policy controlled system with anonymity Theoretical Computer Science | 2018-09-24 | Paper |
Introduction to security reduction | 2018-07-18 | Paper |
Identity-based quotable ring signature Information Sciences | 2018-05-17 | Paper |
One-Round Attribute-Based Key Exchange in the Multi-Party Setting International Journal of Foundations of Computer Science | 2018-02-23 | Paper |
Efficient \(k\)-out-of-\(n\) oblivious transfer scheme with the ideal communication cost Theoretical Computer Science | 2018-02-06 | Paper |
Optimal security reductions for unique signatures: bypassing impossibilities with a counterexample | 2017-11-15 | Paper |
Privacy-preserving point-inclusion protocol for an arbitrary area based on phase-encoded quantum private query Quantum Information Processing | 2017-10-24 | Paper |
A note on the strong authenticated key exchange with auxiliary inputs Designs, Codes and Cryptography | 2017-09-15 | Paper |
Strong authenticated key exchange with auxiliary inputs Designs, Codes and Cryptography | 2017-09-15 | Paper |
Hierarchical functional encryption for linear transformations | 2017-08-25 | Paper |
Mergeable and revocable identity-based encryption | 2017-08-25 | Paper |
ID-based encryption with equality test against insider attack | 2017-08-25 | Paper |
Privacy-preserving \(k\)-time authenticated secret handshakes | 2017-08-25 | Paper |
A new generic construction of anonymous designated confirmer signature for privacy-preserving fair exchange International Journal of Computer Mathematics | 2017-07-28 | Paper |
Identity-Based Secure DistributedData Storage Schemes IEEE Transactions on Computers | 2017-06-20 | Paper |
Achieving IND-CCA Security for Functional Encryption for Inner Products Information Security and Cryptology | 2017-05-05 | Paper |
Cryptographic reverse firewall via malleable smooth projective hash functions Advances in Cryptology – ASIACRYPT 2016 | 2017-02-01 | Paper |
Iterated random oracle: a universal approach for finding loss in security reduction Advances in Cryptology – ASIACRYPT 2016 | 2017-01-06 | Paper |
One-round attribute-based key exchange in the multi-party setting Provable Security | 2017-01-06 | Paper |
Updatable Lossy Trapdoor Functions and Its Application in Continuous Leakage Provable Security | 2017-01-06 | Paper |
Ciphertext-policy attribute based encryption supporting access policy update Provable Security | 2017-01-06 | Paper |
One-round strong oblivious signature-based envelope Information Security and Privacy | 2016-09-02 | Paper |
Proxy signature with revocation Information Security and Privacy | 2016-09-02 | Paper |
Content-based encryption Information Security and Privacy | 2016-09-02 | Paper |
Linear encryption with keyword search Information Security and Privacy | 2016-09-02 | Paper |
Public Key Encryption with Authorized Keyword Search Information Security and Privacy | 2016-09-02 | Paper |
Anonymous identity-based broadcast encryption with revocation for file sharing Information Security and Privacy | 2016-09-02 | Paper |
Ciphertext-policy attribute-based encryption with key-delegation abuse resistance Information Security and Privacy | 2016-08-31 | Paper |
Threshold broadcast encryption with keyword search Information Security and Cryptology | 2016-07-25 | Paper |
Generalized closest substring encryption Designs, Codes and Cryptography | 2016-06-27 | Paper |
Relations between robustness and RKA security under public-key encryption Theoretical Computer Science | 2016-04-13 | Paper |
Strongly leakage-resilient authenticated key exchange Topics in Cryptology - CT-RSA 2016 | 2016-04-08 | Paper |
An efficient quantum scheme for private set intersection Quantum Information Processing | 2016-04-04 | Paper |
Provably Secure Identity Based Provable Data Possession Provable Security | 2016-01-27 | Paper |
Efficient dynamic threshold identity-based encryption with constant-size ciphertext Theoretical Computer Science | 2015-12-08 | Paper |
An efficient privacy-preserving e-coupon system Information Security and Cryptology | 2015-11-25 | Paper |
Key continual-leakage resilient broadcast cryptosystem from dual system in broadcast networks Frontiers of Computer Science | 2015-11-20 | Paper |
Improved identity-based online/offline encryption Information Security and Privacy | 2015-10-20 | Paper |
A new public remote integrity checking scheme with user privacy Information Security and Privacy | 2015-10-20 | Paper |
A new general framework for secure public key encryption with keyword search Information Security and Privacy | 2015-10-20 | Paper |
Complete robustness in identity-based encryption Provable Security | 2015-09-29 | Paper |
PPDCP-ABE: Privacy-Preserving Decentralized Ciphertext-Policy Attribute-Based Encryption Computer Security - ESORICS 2014 | 2015-07-27 | Paper |
Security pitfalls of an efficient threshold proxy signature scheme for mobile agents Information Processing Letters | 2015-06-25 | Paper |
Key management for smart grid based on asymmetric key-wrapping International Journal of Computer Mathematics | 2015-06-24 | Paper |
A new signature scheme without random oracles from bilinear pairings Progress in Cryptology - VIETCRYPT 2006 | 2014-08-21 | Paper |
Efficient and dynamic key management for multiple identities in identity-based systems Information Sciences | 2014-08-01 | Paper |
On security of a certificateless signcryption scheme Information Sciences | 2014-08-01 | Paper |
Identity based identification from algebraic coding theory Theoretical Computer Science | 2014-01-13 | Paper |
\(k\)-time proxy signature: formal definition and efficient construction Provable Security | 2013-10-23 | Paper |
Anonymous signcryption against linear related-key attacks Provable Security | 2013-10-23 | Paper |
Efficient and secure stored-value cards with leakage resilience Computers and Electrical Engineering | 2013-08-19 | Paper |
Membership encryption and its applications Information Security and Privacy | 2013-06-28 | Paper |
Provably secure proxy signature scheme from factorization Mathematical and Computer Modelling | 2013-01-24 | Paper |
A provably secure authenticated key agreement protocol for wireless communications Computers and Electrical Engineering | 2012-10-19 | Paper |
Efficient oblivious transfers with access control Computers & Mathematics with Applications | 2012-09-30 | Paper |
A pre-computable signature scheme with efficient verification for RFID Information Security Practice and Experience | 2012-06-29 | Paper |
An efficient dynamic authenticated key exchange protocol with selectable identities Computers & Mathematics with Applications | 2011-09-18 | Paper |
Provably secure server-aided verification signatures Computers & Mathematics with Applications | 2011-08-28 | Paper |
Efficient online/offline signatures with computational leakage resilience in online phase Information Security and Cryptology | 2011-07-29 | Paper |
Electronic cash with anonymous user suspension Information Security and Privacy | 2011-07-07 | Paper |
Policy-based authentication for mobile agents Information Security Practice and Experience | 2011-05-19 | Paper |
Provably secure identity-based authenticated key agreement protocols with malicious private key generators Information Sciences | 2011-01-28 | Paper |
Certificateless threshold signature scheme from bilinear maps Information Sciences | 2011-01-28 | Paper |
Towards a cryptographic treatment of publish/subscribe systems Cryptology and Network Security | 2010-12-07 | Paper |
Enhanced security notions for dedicated-key hash functions: definitions and relationships Fast Software Encryption | 2010-07-13 | Paper |
Further observations on optimistic fair exchange protocols in the multi-user setting Public Key Cryptography – PKC 2010 | 2010-05-28 | Paper |
Escrowed deniable identification schemes Security Technology | 2010-04-23 | Paper |
Server-controlled identity-based authenticated key exchange Provable Security | 2009-12-11 | Paper |
How to prove security of a signature with a tighter security reduction Provable Security | 2009-12-11 | Paper |
Is the notion of divisible on-line/off-line signatures stronger than on-line/off-line signatures? Provable Security | 2009-12-11 | Paper |
scientific article; zbMATH DE number 5622710 (Why is no real title available?) | 2009-10-28 | Paper |
Universal Designated Verifier Signatures with Threshold-Signers Advances in Information and Computer Security | 2009-10-28 | Paper |
Certificateless threshold ring signature Information Sciences | 2009-10-01 | Paper |
Enhanced Target Collision Resistant Hash Functions Revisited Fast Software Encryption | 2009-08-11 | Paper |
Efficient Non-interactive Range Proof Lecture Notes in Computer Science | 2009-07-23 | Paper |
Analysis of Property-Preservation Capabilities of the ROX and ESh Hash Domain Extenders Information Security and Privacy | 2009-06-25 | Paper |
Asymmetric Group Key Agreement Advances in Cryptology - EUROCRYPT 2009 | 2009-05-12 | Paper |
Privacy for Private Key in Signatures Information Security and Cryptology | 2009-04-29 | Paper |
Dynamic Universal Accumulators for DDH Groups and Their Application to Attribute-Based Anonymous Credential Systems Topics in Cryptology – CT-RSA 2009 | 2009-04-29 | Paper |
Publicly Verifiable Privacy-Preserving Group Decryption Information Security and Cryptology | 2009-04-29 | Paper |
Multi-identity management for identity-based cryptography Journal of Discrete Mathematical Sciences and Cryptography | 2009-04-28 | Paper |
Efficient Generic On-Line/Off-Line Signatures Without Key Exposure Applied Cryptography and Network Security | 2009-03-10 | Paper |
Concurrent Signatures without a Conventional Keystone Coding and Cryptology | 2009-03-09 | Paper |
Practical Compact E-Cash Information Security and Privacy | 2009-03-06 | Paper |
Certificateless Signature Revisited Information Security and Privacy | 2009-03-06 | Paper |
Certificate-Based Signatures: New Definitions and a Generic Construction from Certificateless Signatures Information Security Applications | 2009-02-24 | Paper |
Identity-Based Online/Offline Encryption Financial Cryptography and Data Security | 2009-02-12 | Paper |
Multi-Identity Single-Key Decryption without Random Oracles Information Security and Cryptology | 2009-02-10 | Paper |
Provably Secure Identity-Based Undeniable Signatures with Selective and Universal Convertibility Information Security and Cryptology | 2009-02-10 | Paper |
Efficient Partially Blind Signatures with Provable Security Computational Science and Its Applications - ICCSA 2006 | 2009-02-10 | Paper |
Optimal Online/Offline Signature: How to Sign a Message without Online Computation Provable Security | 2009-01-27 | Paper |
Server-Aided Verification Signatures: Definitions and New Constructions Provable Security | 2009-01-27 | Paper |
Sanitizable Signatures Revisited Cryptology and Network Security | 2009-01-09 | Paper |
Constant-Size Dynamic k-TAA Lecture Notes in Computer Science | 2008-11-27 | Paper |
Efficient generic on-line/off-line (threshold) signatures without key exposure Information Sciences | 2008-11-20 | Paper |
RFID Privacy Models Revisited Computer Security - ESORICS 2008 | 2008-10-27 | Paper |
Efficient Provably Secure Restrictive Partially Blind Signatures from Bilinear Pairings Financial Cryptography and Data Security | 2008-09-09 | Paper |
Compact E-Cash from Bounded Accumulator Lecture Notes in Computer Science | 2008-04-17 | Paper |
A Generic Construction for Universally-Convertible Undeniable Signatures Cryptology and Network Security | 2008-04-15 | Paper |
Mutative Identity-Based Signatures or Dynamic Credentials Without Random Oracles Cryptology and Network Security | 2008-04-15 | Paper |
New Construction of Group Secret Handshakes Based on Pairings Information and Communications Security | 2008-03-25 | Paper |
Formal Definition and Construction of Nominative Signature Information and Communications Security | 2008-03-25 | Paper |
Identity-Based Encryption: How to Decrypt Multiple Ciphertexts Using a Single Decryption Key Pairing-Based Cryptography – Pairing 2007 | 2007-11-29 | Paper |
Provably Secure Pairing-Based Convertible Undeniable Signature with Short Signature Length Pairing-Based Cryptography – Pairing 2007 | 2007-11-29 | Paper |
Progress in Cryptology - INDOCRYPT 2003 Lecture Notes in Computer Science | 2007-11-29 | Paper |
Online/Offline Signatures and Multisignatures for AODV and DSR Routing Security Information Security and Privacy | 2007-09-07 | Paper |
Multi-party Stand-Alone and Setup-Free Verifiably Committed Signatures Public Key Cryptography – PKC 2007 | 2007-09-04 | Paper |
Information Security and Cryptology - ICISC 2005 Lecture Notes in Computer Science | 2007-05-02 | Paper |
Cryptology and Network Security Lecture Notes in Computer Science | 2006-11-14 | Paper |
Information Security and Privacy Lecture Notes in Computer Science | 2006-06-22 | Paper |
Information Security and Cryptology - ICISC 2003 Lecture Notes in Computer Science | 2005-12-27 | Paper |
Financial Cryptography and Data Security Lecture Notes in Computer Science | 2005-12-22 | Paper |
Information Security and Privacy Lecture Notes in Computer Science | 2005-09-07 | Paper |
Information and Communications Security Lecture Notes in Computer Science | 2005-08-19 | Paper |
Advances in Computer Science - ASIAN 2004. Higher-Level Decision Making Lecture Notes in Computer Science | 2005-08-17 | Paper |
Advances in Computer Science - ASIAN 2004. Higher-Level Decision Making Lecture Notes in Computer Science | 2005-08-17 | Paper |
Distributed Computing - IWDC 2004 Lecture Notes in Computer Science | 2005-08-12 | Paper |
Applied Cryptography and Network Security Lecture Notes in Computer Science | 2005-06-13 | Paper |
scientific article; zbMATH DE number 1980964 (Why is no real title available?) | 2003-09-15 | Paper |
scientific article; zbMATH DE number 1950357 (Why is no real title available?) | 2003-07-17 | Paper |
scientific article; zbMATH DE number 1857529 (Why is no real title available?) | 2003-05-19 | Paper |
scientific article; zbMATH DE number 1424187 (Why is no real title available?) | 2002-04-08 | Paper |
scientific article; zbMATH DE number 1424177 (Why is no real title available?) | 2002-03-18 | Paper |
scientific article; zbMATH DE number 1700046 (Why is no real title available?) | 2002-02-03 | Paper |
scientific article; zbMATH DE number 1689603 (Why is no real title available?) | 2002-01-13 | Paper |
scientific article; zbMATH DE number 1942816 (Why is no real title available?) | 2002-01-01 | Paper |
scientific article; zbMATH DE number 1612525 (Why is no real title available?) | 2001-07-01 | Paper |
scientific article; zbMATH DE number 1583942 (Why is no real title available?) | 2001-04-03 | Paper |
scientific article; zbMATH DE number 1500498 (Why is no real title available?) | 2000-09-04 | Paper |
scientific article; zbMATH DE number 1420970 (Why is no real title available?) | 2000-08-24 | Paper |
On the design of efficient RSA-based off-line electronic cash schemes Theoretical Computer Science | 2000-08-23 | Paper |
scientific article; zbMATH DE number 1304304 (Why is no real title available?) | 1999-11-29 | Paper |
scientific article; zbMATH DE number 1303965 (Why is no real title available?) | 1999-06-17 | Paper |