Efficient Online-friendly Two-Party ECDSA Signature. | 0 | 0.34 | 2022 |
Non-Interactive Multi-Client Searchable Encryption: Realization and Implementation | 0 | 0.34 | 2022 |
Don't Tamper with Dual System Encryption - Beyond Polynomial Related-Key Security of IBE | 0 | 0.34 | 2022 |
Efficient Online-friendly Two-Party ECDSA Signature | 0 | 0.34 | 2021 |
One-More Unforgeability of Blind ECDSA | 0 | 0.34 | 2021 |
Security on SM2 and GOST Signatures against Related Key Attacks | 0 | 0.34 | 2021 |
Privacy-Preserving Contact Tracing Protocol for Mobile Devices - A Zero-Knowledge Proof Approach. | 0 | 0.34 | 2021 |
Dualring: Generic Construction Of Ring Signatures With Efficient Instantiations | 0 | 0.34 | 2021 |
One-more Unforgeability of Blind ECDSA. | 0 | 0.34 | 2021 |
A Trustless GQ Multi-signature Scheme with Identifiable Abort | 0 | 0.34 | 2021 |
PAChain: Private, authenticated & auditable consortium blockchain and its implementation | 0 | 0.34 | 2020 |
Server-aided revocable attribute-based encryption for cloud computing services. | 1 | 0.35 | 2020 |
Strong Known Related-Key Attacks and the Security of ECDSA. | 0 | 0.34 | 2019 |
RingCT 3.0 for Blockchain Confidential Transaction: Shorter Size and Stronger Security. | 1 | 0.36 | 2019 |
Anonymity Reduction Attacks to Monero. | 0 | 0.34 | 2018 |
Compact Ring Signature In The Standard Model For Blockchain | 0 | 0.34 | 2018 |
Time-Based Direct Revocable Ciphertext-Policy Attribute-Based Encryption with Short Revocation List. | 1 | 0.35 | 2018 |
Ringct 2.0: A Compact Accumulator-Based (Linkable Ring Signature) Protocol For Blockchain Cryptocurrency Monero | 9 | 0.50 | 2017 |
A general framework for secure sharing of personal health records in cloud system | 5 | 0.44 | 2017 |
Efficient privacy-preserving charging station reservation system for electric vehicles | 1 | 0.35 | 2016 |
Efficient Construction of Completely Non-Malleable CCA Secure Public Key Encryption. | 0 | 0.34 | 2016 |
ABKS-CSC: attribute-based keyword search with constant-size ciphertexts. | 0 | 0.34 | 2016 |
Efficient Completely Non-Malleable and RKA Secure Public Key Encryptions. | 0 | 0.34 | 2016 |
Accountable mobile E-commerce scheme via identity-based plaintext-checkable encryption. | 7 | 0.43 | 2016 |
k-Times Attribute-Based Anonymous Access Control for Cloud Computing. | 0 | 0.34 | 2015 |
Related Randomness Attacks for Public Key Cryptosystems | 3 | 0.38 | 2015 |
Improvements on an authentication scheme for vehicular sensor networks | 32 | 0.86 | 2014 |
Exponent-inversion Signatures and IBE under Static Assumptions. | 0 | 0.34 | 2014 |
Attribute Specified Identity-Based Encryption. | 1 | 0.35 | 2013 |
Multi-key leakage-resilient threshold cryptography | 2 | 0.36 | 2013 |
Threshold-Oriented Optimistic Fair Exchange. | 3 | 0.37 | 2013 |
Leakage-resilient certificateless public key encryption | 1 | 0.35 | 2013 |
Secure ID-based linkable and revocable-iff-linked ring signature with constant-size construction | 14 | 0.54 | 2013 |
Towards Anonymous Ciphertext Indistinguishability with Identity Leakage | 2 | 0.36 | 2013 |
Efficient Linkable and/or Threshold Ring Signature Without Random Oracles | 16 | 0.66 | 2013 |
Encryption Schemes with Post-Challenge Auxiliary Inputs. | 1 | 0.35 | 2013 |
Fully leakage-resilient signatures with auxiliary inputs | 9 | 0.46 | 2012 |
Forward secure attribute-based signatures | 6 | 0.43 | 2012 |
Continual leakage-resilient dynamic secret sharing in the split-state model | 0 | 0.34 | 2012 |
Identity-based encryption resilient to continual auxiliary leakage | 47 | 1.10 | 2012 |
PE(AR)2: Privacy-Enhanced Anonymous Authentication with Reputation and Revocation. | 10 | 0.51 | 2012 |
Concurrent signatures with fully negotiable binding control | 3 | 0.40 | 2011 |
Forward secure ring signature without random oracles | 9 | 0.48 | 2011 |
Threshold ring signature without random oracles | 6 | 0.42 | 2011 |
Fully secure multi-authority ciphertext-policy attribute-based encryption without random oracles | 36 | 1.15 | 2011 |
How to Construct Identity-Based Signatures without the Key Escrow Problem | 15 | 0.78 | 2010 |
Towards a cryptographic treatment of publish/subscribe systems | 7 | 0.41 | 2010 |
Efficient Non-interactive Range Proof | 3 | 0.37 | 2009 |
Sanitizable Signatures Revisited | 11 | 0.85 | 2008 |
(Convertible) undeniable signatures without random oracles | 10 | 0.52 | 2007 |