Fei Li

Orcid: 0000-0002-8916-8330

Affiliations:
  • Guangzhou University, Guangzhou, China
  • Ludong University, Yantai, China


According to our database1, Fei Li authored at least 15 papers between 2007 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A certificateless signature scheme and a certificateless public auditing scheme with authority trust level 3+.
J. Ambient Intell. Humaniz. Comput., February, 2024

2019
Double-authentication-preventing signatures revisited: new definition and construction from chameleon hash.
Frontiers Inf. Technol. Electron. Eng., 2019

2017
Certificateless Cryptography with KGC Trust Level 3 Revisited.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017

2016
Round-optimal ID-based dynamic authenticated group key agreement.
Int. J. High Perform. Syst. Archit., 2016

An ID-based Dynamic Authenticated Group Key Agreement Scheme with Optimal Round Complexity from Pairings.
Proceedings of the 10th International Conference on Complex, 2016

2014
Efficient identity-based threshold signature scheme from bilinear pairings in standard model.
Int. J. Internet Protoc. Technol., 2014

2013
Short Convertible Undeniable Signature From Pairing.
J. Softw., 2013

2012
An Efficient Certificateless Threshold Decryption Schemes Based On Pairings.
J. Comput., 2012

Round-Optimal ID-Based Blind Signature Schemes without ROS Assumption.
J. Commun., 2012

On Generic Construction for Private Designated Verifier Signatures.
Proceedings of the Eighth International Conference on Computational Intelligence and Security, 2012

2009
Chameleon hash without key exposure based on Schnorr signature.
Comput. Stand. Interfaces, 2009

Perfect Subliminal Channel in a Paring-Based Digital Signature.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

An Efficient Threshold Signature Scheme Without Random Oracles.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

2008
An Abuse-Free Optimistic Fair Exchange Protocol Based on BLS Signature.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008

2007
One-Round ID-Based Blind Signature Scheme without ROS Assumption.
IACR Cryptol. ePrint Arch., 2007


  Loading...