Yuanju Gan

Orcid: 0000-0002-9555-7631

According to our database1, Yuanju Gan authored at least 7 papers between 2013 and 2021.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
A Fully Adaptively Secure Threshold Signature Scheme Based on Dual-Form Signatures Technology.
Secur. Commun. Networks, 2021

Self-Adaptive Image Encryption Algorithm Based on Quantum Logistic Map.
Secur. Commun. Networks, 2021

2014
Efficient threshold public key encryption with full security based on dual pairing vector spaces.
Int. J. Commun. Syst., 2014

2013
CCA Secure Threshold KEM Scheme Against Adaptive Corruption Attacks in Standard Model.
J. Softw., 2013

Publicly Verifiable Secret Sharing Scheme with Provable Security against Chosen Secret Attacks.
Int. J. Distributed Sens. Networks, 2013

Chameleon Hash Functions and One-Time Signature Schemes from Inner Automorphism Groups.
Fundam. Informaticae, 2013

Efficient Construction of CCA-Secure Threshold PKE Based on Hashed Diffie-Hellman Assumption.
Comput. J., 2013


  Loading...