Showing results 1 to 13 of 13
Title | Author(s) | Issue Date | |
---|---|---|---|
A DFA-based functional proxy re-encryption scheme for secure public cloud data sharing Journal:IEEE Transactions on Information Forensics and Security | 2014 | ||
A secure and efficient Ciphertext-Policy Attribute-Based Proxy Re-Encryption for cloud data sharing Journal:Future Generation Computer Systems | 2015 | ||
A suite of non-pairing ID-based threshold ring signature schemes with different levels of anonymity (extended abstract) Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2010 | ||
An adaptively CCA-secure ciphertext-policy attribute-based proxy re-encryption for cloud data sharing Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2014 | ||
Concurrent signatures with fully negotiable binding control Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2011 | ||
2016 | |||
Efficient non-interactive range proof Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2009 | ||
Fairness in concurrent signatures revisited Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2013 | ||
Fully secure multi-authority ciphertext-policy attribute-based encryption without random oracles Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2011 | ||
ID-based ring signature scheme secure in the standard model Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2006 | ||
Malicious KGC attacks in certificateless cryptography Proceeding/Conference:eProceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS '07 | 2007 | ||
Separable linkable threshold ring signatures Proceeding/Conference:Cryptology - INDOCRYPT 2004: 5th International Conference on Cryptology in India, Chennai, India, December 20-22, 2004. Proceedings | 2004 | ||
Traceable and retrievable identity-based encryption Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2008 |