2008 |
9 | EE | Jia Yu,
Fanyu Kong,
Xiangguo Cheng,
Rong Hao,
Guowen Li:
Cryptanalysis of Vo-Kim Forward Secure Signature in ICISC 2005.
ProvSec 2008: 176-184 |
8 | EE | Jia Yu,
Fanyu Kong,
Xiangguo Cheng,
Rong Hao,
Guowen Li:
Construction of Yet Another Forward Secure Signature Scheme Using Bilinear Maps.
ProvSec 2008: 83-97 |
7 | EE | Jia Yu,
Fanyu Kong,
Rong Hao,
Dexiang Zhang,
Guowen Li:
How to Construct Forward Secure Single-Server, Multi-Server and Threshold-Server Assisted Signature Schemes Using Bellare-Miner Scheme.
JCM 3(7): 28-35 (2008) |
6 | EE | Jia Yu,
Fanyu Kong,
Rong Hao,
Xuliang Li,
Guowen Li:
Publicly Verifiable Secret Sharing Member-join Protocol For Threshold Signatures.
JCM 3(7): 36-43 (2008) |
2007 |
5 | EE | Guowen Li,
Jia Yu,
Rupeng Li,
Daxing Li:
Two Threshold Multisignature Schemes from Bilinear Pairings.
MUE 2007: 1041-1045 |
4 | EE | Rupeng Li,
Jia Yu,
Guowen Li,
Daxing Li:
A New Identity-Based Blind Signature Scheme with Batch Verifications.
MUE 2007: 1051-1056 |
3 | EE | Rupeng Li,
Xianghua Du,
Guowen Li,
Jia Yu,
Daxing Li:
Key-Insulated Group Signature Scheme with Selective Revocation.
MUE 2007: 1057-1063 |
2 | EE | Guowen Li,
Jia Yu,
Rupeng Li,
Daxing Li:
An Approach to Convert Any Threshold Signature into a Threshold Group Signature.
SNPD (2) 2007: 723-726 |
1 | EE | Rupeng Li,
Jia Yu,
Jin Wang,
Guowen Li,
Daxing Li:
Key-Insulated Group Signature Scheme with Verifier-Local Revocation.
SNPD (3) 2007: 273-278 |