Zuhua Shao

According to our database1, Zuhua Shao authored at least 43 papers between 2001 and 2016.

Collaborative distances:
  • Dijkstra number2 of six.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2016
Practical verifiably encrypted signatures based on discrete logarithms.
Secur. Commun. Networks, 2016

2015
Practical verifiably encrypted signature based on Waters signatures.
IET Inf. Secur., 2015

Certificate-based Fair Exchange Protocol of Schnorr Signatures in Chosen-key Model.
Fundam. Informaticae, 2015

Certificate-based verifiably encrypted RSA signatures.
Trans. Emerg. Telecommun. Technol., 2015

2014
Practical verifiably encrypted signatures without random oracles.
Inf. Sci., 2014

2012
Verifiably encrypted short signatures from bilinear maps.
Ann. des Télécommunications, 2012

2011
Enhanced Certificate-Based Encryption from pairings.
Comput. Electr. Eng., 2011

2010
Multisignature Scheme Based on Discrete Logarithms in the Plain Public Key Model.
Informatica (Slovenia), 2010

Strong designated verifier signature scheme: new definition and construction.
IACR Cryptol. ePrint Arch., 2010

Breaking Pomykala-Barabasz Threshold Proxy Signature Scheme.
Fundam. Informaticae, 2010

Fair exchange protocol of Schnorr signatures with semi-trusted adjudicator.
Comput. Electr. Eng., 2010

2009
Improvement of identity-based proxy multi-signature scheme.
J. Syst. Softw., 2009

Security of self-certified signatures.
Inf. Process. Lett., 2009

Provably secure proxy-protected signature schemes based on RSA.
Comput. Electr. Eng., 2009

Dynamic and efficient joint encryption scheme in the plain public key model.
Comput. Electr. Eng., 2009

2008
Certificate-based verifiably encrypted signatures from pairings.
Inf. Sci., 2008

Repairing Efficient Threshold Group Signature Scheme.
Int. J. Netw. Secur., 2008

Fair exchange protocol of signatures based on aggregate signatures.
Comput. Commun., 2008

Certificate-based fair exchange protocol of signatures from pairings.
Comput. Networks, 2008

2007
Self-certified signature scheme from pairings.
J. Syst. Softw., 2007

A provably secure short signature scheme based on discrete logarithms.
Inf. Sci., 2007

Self-certified Signatures Based on Discrete Logarithms.
Proceedings of the Arithmetic of Finite Fields, First International Workshop, 2007

On the Sequentiality of Three Optimal Structured Multisignature Schemes.
Proceedings of the Information Security Practice and Experience, 2007

2006
Security of the design of time-stamped signatures.
J. Comput. Syst. Sci., 2006

Cryptanalysis and Improvement of Practical Convertible Authenticated Encryption Schemes Using Self-Certified Public Keys.
Informatica, 2006

Comment on Improvement of the Miyazaki-Takaragi Threshold Digital Signature Scheme.
Int. J. Netw. Secur., 2006

2005
Cryptanalysis of Xia-You group signature scheme.
J. Syst. Softw., 2005

Improvement of Threshold Signature Using Self-certified Public Keys.
Int. J. Netw. Secur., 2005

Security of a new digital signature scheme based on factoring and discrete logarithms.
Int. J. Comput. Math., 2005

Security of meta-He digital signature scheme based on factoring and discrete logarithms.
Appl. Math. Comput., 2005

Improvement of efficient proxy signature schemes using self-certified public keys.
Appl. Math. Comput., 2005

A new key authentication scheme for cryptosystems based on discrete logarithms.
Appl. Math. Comput., 2005

Short Signature Scheme Based on Discrete Logarithms.
Proceedings of the Advances in Web-Age Information Management, 2005

Enhanced Aggregate Signatures from Pairings.
Proceedings of the Information Security and Cryptology, First SKLOIS Conference, 2005

2004
Improvement of digital signature with message recovery and its variants based on elliptic curve discrete logarithm problem.
Comput. Stand. Interfaces, 2004

Improvement of threshold proxy signature scheme.
Comput. Stand. Interfaces, 2004

Efficient deniable authentication protocol based on generalized ElGamal signature scheme.
Comput. Stand. Interfaces, 2004

Improvement of digital signature with message recovery using self-certified public keys and its variants.
Appl. Math. Comput., 2004

2003
Cryptanalysis of "an identity-based society oriented signature scheme with anonymous signers".
Inf. Process. Lett., 2003

Proxy signature schemes based on factoring.
Inf. Process. Lett., 2003

Cryptanalysis of publicly verifiable authenticated encryption.
IACR Cryptol. ePrint Arch., 2003

Security of robust generalized MQV key agreement protocol without using one-way hash functions.
Comput. Stand. Interfaces, 2003

2001
Batch verifying multiple DSA-type digital signatures.
Comput. Networks, 2001


  Loading...