Publication Venue For Leakage-resilient ring signature schemes 2019 Efficient k-out-of-n oblivious transfer scheme with the ideal communication cost 2018 Policy controlled system with anonymity 2018 A generalized attack on RSA type cryptosystems 2017 Ambiguous optimistic fair exchange: definition and constructions 2015 Efficient algorithms for secure outsourcing of bilinear pairings 2015 Optimistic fair exchange in the enhanced chosen-key model 2015 Privacy-preserving encryption scheme using DNA parentage test 2015 Attribute-based optimistic fair exchange: how to restrict brokers with policies 2014 Identity based identification from algebraic coding theory 2014 Secure ID-based linkable and revocable-iff-linked ring signature with constant-size construction 2013 Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword search 2012 Certificateless cryptography with KGC trust level 3 2011 Certificateless public key encryption: a new generic construction and two pairing-free schemes 2011 Identity-based trapdoor mercurial commitments and applications 2011 Short fail-stop signature scheme based on factorization and discrete logarithm assumptions 2009 A new framework for the design and analysis of identity-based identification schemes 2008 An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices 2007
Publication Venue For Leakage-resilient ring signature schemes 2019 Efficient k-out-of-n oblivious transfer scheme with the ideal communication cost 2018 Policy controlled system with anonymity 2018 A generalized attack on RSA type cryptosystems 2017 Ambiguous optimistic fair exchange: definition and constructions 2015 Efficient algorithms for secure outsourcing of bilinear pairings 2015 Optimistic fair exchange in the enhanced chosen-key model 2015 Privacy-preserving encryption scheme using DNA parentage test 2015 Attribute-based optimistic fair exchange: how to restrict brokers with policies 2014 Identity based identification from algebraic coding theory 2014 Secure ID-based linkable and revocable-iff-linked ring signature with constant-size construction 2013 Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword search 2012 Certificateless cryptography with KGC trust level 3 2011 Certificateless public key encryption: a new generic construction and two pairing-free schemes 2011 Identity-based trapdoor mercurial commitments and applications 2011 Short fail-stop signature scheme based on factorization and discrete logarithm assumptions 2009 A new framework for the design and analysis of identity-based identification schemes 2008 An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices 2007