Nasrollah Pakniat

Orcid: 0000-0003-3925-1141

According to our database1, Nasrollah Pakniat authored at least 22 papers between 2011 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Certificate-based authenticated encryption with keyword search: Enhanced security model and a concrete construction for Internet of Things.
J. Inf. Secur. Appl., February, 2024

2023
Designated-Server Hierarchical Searchable Encryption in Identity-Based Setting.
ISC Int. J. Inf. Secur., October, 2023

A New Social Multi-Secret Sharing Scheme using Birkhoff Interpolation and Chinese Remainder Theorem.
ISC Int. J. Inf. Secur., 2023

2022
A generic construction to build simple oblivious transfer protocols from homomorphic encryption schemes.
J. Supercomput., 2022

Pairing-free certificateless authenticated encryption with keyword search.
J. Syst. Archit., 2022

2020
Cryptanalysis and improvement of a group RFID authentication protocol.
Wirel. Networks, 2020

Certificateless authenticated encryption with keyword search: Enhanced security model and a concrete construction for industrial IoT.
J. Inf. Secur. Appl., 2020

A simple generic construction to build oblivious transfer protocols from homomorphic encryption schemes.
IACR Cryptol. ePrint Arch., 2020

2019
Designated tester certificateless encryption with keyword search.
J. Inf. Secur. Appl., 2019

Security analysis of two lightweight certi ficateless signature schemes.
IACR Cryptol. ePrint Arch., 2019

Security analysis of two lightweight certificateless signature schemes.
CoRR, 2019

2018
On the Security of a Certificateless Strong Designated Verifier Signature Scheme.
IACR Cryptol. ePrint Arch., 2018

Cryptanalysis and Improvement of a Pairing-Free Certificateless Signature Scheme.
Proceedings of the 15th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, 2018

2017
Reducing Multi-Secret Sharing Problem to Sharing a Single Secret Based on Cellular Automata.
IACR Cryptol. ePrint Arch., 2017

2016
Ideal social secret sharing using Birkhoff interpolation method.
Secur. Commun. Networks, 2016

Cryptanalysis of a certificateless aggregate signature scheme.
IACR Cryptol. ePrint Arch., 2016

2015
Distributed key generation protocol with hierarchical threshold access structure.
IET Inf. Secur., 2015

2014
Secret image sharing scheme with hierarchical threshold access structure.
J. Vis. Commun. Image Represent., 2014

Certificateless aggregate signcryption: Security model and a concrete construction secure in the random oracle model.
J. King Saud Univ. Comput. Inf. Sci., 2014

A note on "Selling multiple secrets to a single buyer".
Inf. Sci., 2014

2011
A Proxy E-Raffle Protocol Based on Proxy Signatures.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2011

Certificateless Aggregate Signcryption Schemes.
IACR Cryptol. ePrint Arch., 2011


  Loading...