2016
Practical verifiably encrypted signatures based on discrete logarithms.
Secur. Commun. Networks, 2016
2015
Practical verifiably encrypted signature based on Waters signatures.
IET Inf. Secur., 2015
Certificate-based Fair Exchange Protocol of Schnorr Signatures in Chosen-key Model.
Fundam. Informaticae, 2015
Certificate-based verifiably encrypted RSA signatures.
Trans. Emerg. Telecommun. Technol., 2015
2014
Practical verifiably encrypted signatures without random oracles.
Inf. Sci., 2014
2012
Verifiably encrypted short signatures from bilinear maps.
Ann. des Télécommunications, 2012
2011
Enhanced Certificate-Based Encryption from pairings.
Comput. Electr. Eng., 2011
2010
Multisignature Scheme Based on Discrete Logarithms in the Plain Public Key Model.
Informatica (Slovenia), 2010
Strong designated verifier signature scheme: new definition and construction.
IACR Cryptol. ePrint Arch., 2010
Breaking Pomykala-Barabasz Threshold Proxy Signature Scheme.
Fundam. Informaticae, 2010
Fair exchange protocol of Schnorr signatures with semi-trusted adjudicator.
Comput. Electr. Eng., 2010
2009
Improvement of identity-based proxy multi-signature scheme.
J. Syst. Softw., 2009
Security of self-certified signatures.
Inf. Process. Lett., 2009
Provably secure proxy-protected signature schemes based on RSA.
Comput. Electr. Eng., 2009
Dynamic and efficient joint encryption scheme in the plain public key model.
Comput. Electr. Eng., 2009
2008
Certificate-based verifiably encrypted signatures from pairings.
Inf. Sci., 2008
Repairing Efficient Threshold Group Signature Scheme.
Int. J. Netw. Secur., 2008
Fair exchange protocol of signatures based on aggregate signatures.
Comput. Commun., 2008
Certificate-based fair exchange protocol of signatures from pairings.
Comput. Networks, 2008
2007
Self-certified signature scheme from pairings.
J. Syst. Softw., 2007
A provably secure short signature scheme based on discrete logarithms.
Inf. Sci., 2007
Self-certified Signatures Based on Discrete Logarithms.
Proceedings of the Arithmetic of Finite Fields, First International Workshop, 2007
On the Sequentiality of Three Optimal Structured Multisignature Schemes.
Proceedings of the Information Security Practice and Experience, 2007
2006
Security of the design of time-stamped signatures.
J. Comput. Syst. Sci., 2006
Cryptanalysis and Improvement of Practical Convertible Authenticated Encryption Schemes Using Self-Certified Public Keys.
Informatica, 2006
Comment on Improvement of the Miyazaki-Takaragi Threshold Digital Signature Scheme.
Int. J. Netw. Secur., 2006
2005
Cryptanalysis of Xia-You group signature scheme.
J. Syst. Softw., 2005
Improvement of Threshold Signature Using Self-certified Public Keys.
Int. J. Netw. Secur., 2005
Security of a new digital signature scheme based on factoring and discrete logarithms.
Int. J. Comput. Math., 2005
Security of meta-He digital signature scheme based on factoring and discrete logarithms.
Appl. Math. Comput., 2005
Improvement of efficient proxy signature schemes using self-certified public keys.
Appl. Math. Comput., 2005
A new key authentication scheme for cryptosystems based on discrete logarithms.
Appl. Math. Comput., 2005
Short Signature Scheme Based on Discrete Logarithms.
Proceedings of the Advances in Web-Age Information Management, 2005
Enhanced Aggregate Signatures from Pairings.
Proceedings of the Information Security and Cryptology, First SKLOIS Conference, 2005
2004
Improvement of digital signature with message recovery and its variants based on elliptic curve discrete logarithm problem.
Comput. Stand. Interfaces, 2004
Improvement of threshold proxy signature scheme.
Comput. Stand. Interfaces, 2004
Efficient deniable authentication protocol based on generalized ElGamal signature scheme.
Comput. Stand. Interfaces, 2004
Improvement of digital signature with message recovery using self-certified public keys and its variants.
Appl. Math. Comput., 2004
2003
Cryptanalysis of "an identity-based society oriented signature scheme with anonymous signers".
Inf. Process. Lett., 2003
Proxy signature schemes based on factoring.
Inf. Process. Lett., 2003
Cryptanalysis of publicly verifiable authenticated encryption.
IACR Cryptol. ePrint Arch., 2003
Security of robust generalized MQV key agreement protocol without using one-way hash functions.
Comput. Stand. Interfaces, 2003
2001
Batch verifying multiple DSA-type digital signatures.
Comput. Networks, 2001