


default search action
BibTeX records: Wei Gao 0007
@article{DBLP:journals/jaihc/LiXGCWM24, author = {Fei Li and Dongqing Xie and Wei Gao and Kefei Chen and Guilin Wang and Roberto Metere}, title = {A certificateless signature scheme and a certificateless public auditing scheme with authority trust level 3+}, journal = {J. Ambient Intell. Humaniz. Comput.}, volume = {15}, number = {2}, pages = {1317--1326}, year = {2024}, url = {https://doi.org/10.1007/s12652-017-0553-x}, doi = {10.1007/S12652-017-0553-X}, timestamp = {Fri, 08 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jaihc/LiXGCWM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/GaoCRLZY22, author = {Wei Gao and Liqun Chen and Chunming Rong and Kaitai Liang and Xianghan Zheng and Jiangshan Yu}, title = {Security Analysis and Improvement of a Redactable Consortium Blockchain for Industrial Internet-of-Things}, journal = {Comput. J.}, volume = {65}, number = {9}, pages = {2430--2438}, year = {2022}, url = {https://doi.org/10.1093/comjnl/bxab080}, doi = {10.1093/COMJNL/BXAB080}, timestamp = {Mon, 03 Mar 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/GaoCRLZY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cluster/ShengTHGH19, author = {Gang Sheng and Chunming Tang and Hongyan Han and Wei Gao and Xing Hu}, title = {Authentication of outsourced linear function query with efficient updates}, journal = {Clust. Comput.}, volume = {22}, number = {Supplement}, pages = {10031--10039}, year = {2019}, url = {https://doi.org/10.1007/s10586-017-1064-4}, doi = {10.1007/S10586-017-1064-4}, timestamp = {Fri, 22 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cluster/ShengTHGH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jzusc/LiGWCT19, author = {Fei Li and Wei Gao and Guilin Wang and Kefei Chen and Chunming Tang}, title = {Double-authentication-preventing signatures revisited: new definition and construction from chameleon hash}, journal = {Frontiers Inf. Technol. Electron. Eng.}, volume = {20}, number = {2}, pages = {176--186}, year = {2019}, url = {https://doi.org/10.1631/FITEE.1700005}, doi = {10.1631/FITEE.1700005}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jzusc/LiGWCT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fcsc/GaoWCW18, author = {Wei Gao and Guilin Wang and Kefei Chen and Xueli Wang}, title = {Efficient identity-based threshold decryption scheme from bilinear pairings}, journal = {Frontiers Comput. Sci.}, volume = {12}, number = {1}, pages = {177--189}, year = {2018}, url = {https://doi.org/10.1007/s11704-016-5271-6}, doi = {10.1007/S11704-016-5271-6}, timestamp = {Sat, 09 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fcsc/GaoWCW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcss/WangXG18, author = {Feng Wang and Li Xu and Wei Gao}, title = {Comments on "SCLPV: Secure Certificateless Public Verification for Cloud-Based Cyber-Physical-Social Systems Against Malicious Auditors"}, journal = {{IEEE} Trans. Comput. Soc. Syst.}, volume = {5}, number = {3}, pages = {854--857}, year = {2018}, url = {https://doi.org/10.1109/TCSS.2018.2858805}, doi = {10.1109/TCSS.2018.2858805}, timestamp = {Sat, 20 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcss/WangXG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/informaticaLT/GaoWCW17, author = {Wei Gao and Guilin Wang and Kefei Chen and Xueli Wang}, title = {Generic Construction of Certificate-Based Signature from Certificateless Signature with Provable Security}, journal = {Informatica}, volume = {28}, number = {2}, pages = {215--235}, year = {2017}, url = {https://content.iospress.com/articles/informatica/inf1143}, timestamp = {Tue, 26 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/informaticaLT/GaoWCW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/LiGXT17, author = {Fei Li and Wei Gao and Dongqing Xie and Chunming Tang}, editor = {Xingming Sun and Han{-}Chieh Chao and Xingang You and Elisa Bertino}, title = {Certificateless Cryptography with {KGC} Trust Level 3 Revisited}, booktitle = {Cloud Computing and Security - Third International Conference, {ICCCS} 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10603}, pages = {292--304}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68542-7\_24}, doi = {10.1007/978-3-319-68542-7\_24}, timestamp = {Mon, 25 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/LiGXT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ShengTGCH17, author = {Gang Sheng and Chunming Tang and Wei Gao and Yunlu Cai and Xing Hu}, title = {Authentication of Outsourced Linear Function Query with Efficient Updates}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {337}, year = {2017}, url = {http://eprint.iacr.org/2017/337}, timestamp = {Fri, 22 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/ShengTGCH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijhpsa/LiXGYW16, author = {Fei Li and Dongqing Xie and Wei Gao and Jianhua Yan and Xu An Wang}, title = {Round-optimal ID-based dynamic authenticated group key agreement}, journal = {Int. J. High Perform. Syst. Archit.}, volume = {6}, number = {3}, pages = {153--161}, year = {2016}, url = {https://doi.org/10.1504/IJHPSA.2016.10001542}, doi = {10.1504/IJHPSA.2016.10001542}, timestamp = {Mon, 09 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijhpsa/LiXGYW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisis/LiXGWY16, author = {Fei Li and Dongqing Xie and Wei Gao and Xu An Wang and Jianhua Yan}, title = {An ID-based Dynamic Authenticated Group Key Agreement Scheme with Optimal Round Complexity from Pairings}, booktitle = {10th International Conference on Complex, Intelligent, and Software Intensive Systems, {CISIS} 2016, Fukuoka, Japan, July 6-8, 2016}, pages = {468--472}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/CISIS.2016.63}, doi = {10.1109/CISIS.2016.63}, timestamp = {Mon, 09 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisis/LiXGWY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/ShengTGY16, author = {Gang Sheng and Chunming Tang and Wei Gao and Ying Yin}, editor = {Jiageng Chen and Vincenzo Piuri and Chunhua Su and Moti Yung}, title = {MD-\emph{VC}\({}_{\mbox{Matrix}}\): An Efficient Scheme for Publicly Verifiable Computation of Outsourced Matrix Multiplication}, booktitle = {Network and System Security - 10th International Conference, {NSS} 2016, Taipei, Taiwan, September 28-30, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9955}, pages = {349--362}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-46298-1\_23}, doi = {10.1007/978-3-319-46298-1\_23}, timestamp = {Thu, 23 Jun 2022 19:57:36 +0200}, biburl = {https://dblp.org/rec/conf/nss/ShengTGY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/GaoWWC15, author = {Wei Gao and Guilin Wang and Xueli Wang and Kefei Chen}, title = {Generic Construction of Certificate-Based Encryption from Certificateless Encryption Revisited}, journal = {Comput. J.}, volume = {58}, number = {10}, pages = {2747--2757}, year = {2015}, url = {https://doi.org/10.1093/comjnl/bxv045}, doi = {10.1093/COMJNL/BXV045}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/GaoWWC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jaihc/YuWG15, author = {Jianhua Yu and Xueli Wang and Wei Gao}, title = {Improvement and applications of secure outsourcing of scientific computations}, journal = {J. Ambient Intell. Humaniz. Comput.}, volume = {6}, number = {6}, pages = {763--772}, year = {2015}, url = {https://doi.org/10.1007/s12652-015-0280-0}, doi = {10.1007/S12652-015-0280-0}, timestamp = {Mon, 10 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jaihc/YuWG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jaihc/WangLQLGLX15, author = {Yilei Wang and Tao Li and Hairong Qin and Jin Li and Wei Gao and Zhe Liu and Qiuliang Xu}, title = {A brief survey on secure multi-party computing in the presence of rational parties}, journal = {J. Ambient Intell. Humaniz. Comput.}, volume = {6}, number = {6}, pages = {807--824}, year = {2015}, url = {https://doi.org/10.1007/s12652-015-0299-2}, doi = {10.1007/S12652-015-0299-2}, timestamp = {Sun, 21 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jaihc/WangLQLGLX15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipt/LiGWCW14, author = {Fei Li and Wei Gao and Guilin Wang and Kefei Chen and Xueli Wang}, title = {Efficient identity-based threshold signature scheme from bilinear pairings in standard model}, journal = {Int. J. Internet Protoc. Technol.}, volume = {8}, number = {2/3}, pages = {107--115}, year = {2014}, url = {https://doi.org/10.1504/IJIPT.2014.066373}, doi = {10.1504/IJIPT.2014.066373}, timestamp = {Thu, 16 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipt/LiGWCW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YuWMG14, author = {Jiangshan Yu and Guilin Wang and Yi Mu and Wei Gao}, title = {An Efficient Generic Framework for Three-Factor Authentication With Provably Secure Instantiation}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {9}, number = {12}, pages = {2302--2313}, year = {2014}, url = {https://doi.org/10.1109/TIFS.2014.2362979}, doi = {10.1109/TIFS.2014.2362979}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/YuWMG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcp/GaoWWX13, author = {Wei Gao and Guilin Wang and Xueli Wang and Dongqing Xie}, title = {Controllable Ring Signatures and Its Application to E-Prosecution}, journal = {J. Comput.}, volume = {8}, number = {4}, pages = {833--841}, year = {2013}, url = {http://www.jcomputers.us/index.php?m=content\&\#38;c=index\&\#38;a=show\&\#38;catid=67\&\#38;id=761}, doi = {10.4304/JCP.8.4.833-841}, timestamp = {Thu, 25 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcp/GaoWWX13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsw/LiGWW13, author = {Fei Li and Wei Gao and Yilei Wang and Xueli Wang}, title = {Short Convertible Undeniable Signature From Pairing}, journal = {J. Softw.}, volume = {8}, number = {12}, pages = {2983--2990}, year = {2013}, url = {https://doi.org/10.4304/jsw.8.12.2983-2990}, doi = {10.4304/JSW.8.12.2983-2990}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsw/LiGWW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcm/GaoWWL12, author = {Wei Gao and Guilin Wang and Xueli Wang and Fei Li}, title = {Round-Optimal ID-Based Blind Signature Schemes without {ROS} Assumption}, journal = {J. Commun.}, volume = {7}, number = {12}, pages = {909--920}, year = {2012}, url = {https://doi.org/10.4304/jcm.7.12.909-920}, doi = {10.4304/JCM.7.12.909-920}, timestamp = {Tue, 14 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcm/GaoWWL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcp/LiGWW12, author = {Fei Li and Wei Gao and Yilei Wang and Xueli Wang}, title = {An Efficient Certificateless Threshold Decryption Schemes Based On Pairings}, journal = {J. Comput.}, volume = {7}, number = {12}, pages = {2987--2996}, year = {2012}, url = {http://www.jcomputers.us/index.php?m=content\&\#38;c=index\&\#38;a=show\&\#38;catid=54\&\#38;id=819}, doi = {10.4304/JCP.7.12.2987-2996}, timestamp = {Thu, 25 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcp/LiGWW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/GaoWL12, author = {Wei Gao and Zhenyou Wang and Fei Li}, title = {On Generic Construction for Private Designated Verifier Signatures}, booktitle = {Eighth International Conference on Computational Intelligence and Security, {CIS} 2012, Guangzhou, China, November 17-18, 2012}, pages = {497--499}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/CIS.2012.117}, doi = {10.1109/CIS.2012.117}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/GaoWL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/idcs/GaoCWW12, author = {Wei Gao and Kefei Chen and Guilin Wang and Xueli Wang}, editor = {Yang Xiang and Mukaddim Pathan and Xiaohui Tao and Hua Wang}, title = {Designated Condition One-Time Signatures}, booktitle = {Internet and Distributed Computing Systems - 5th International Conference, {IDCS} 2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7646}, pages = {253--263}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34883-9\_20}, doi = {10.1007/978-3-642-34883-9\_20}, timestamp = {Mon, 24 Jun 2024 12:10:07 +0200}, biburl = {https://dblp.org/rec/conf/idcs/GaoCWW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GaoWWC12, author = {Wei Gao and Guilin Wang and Xueli Wang and Kefei Chen}, title = {Efficient identity-based threshold signature scheme from bilinear pairings in the standard model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {73}, year = {2012}, url = {http://eprint.iacr.org/2012/073}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GaoWWC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GaoWCWZ12, author = {Wei Gao and Guilin Wang and Kefei Chen and Xueli Wang and Guoyan Zhang}, title = {Efficient identity-based threshold decryption scheme from bilinear pairings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {75}, year = {2012}, url = {http://eprint.iacr.org/2012/075}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GaoWCWZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GaoWCW12, author = {Wei Gao and Guilin Wang and Kefei Chen and Xueli Wang}, title = {Provably Secure Generic Construction of Certificate Based Signature from Certificateless Signature in Standard Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {104}, year = {2012}, url = {http://eprint.iacr.org/2012/104}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GaoWCW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GaoWCW12a, author = {Wei Gao and Guilin Wang and Kefei Chen and Xueli Wang}, title = {Generic Construction of Certificate Based Encryption from Certificateless Encryption Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {105}, year = {2012}, url = {http://eprint.iacr.org/2012/105}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GaoWCW12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/GaoLW09, author = {Wei Gao and Fei Li and Xueli Wang}, title = {Chameleon hash without key exposure based on Schnorr signature}, journal = {Comput. Stand. Interfaces}, volume = {31}, number = {2}, pages = {282--285}, year = {2009}, url = {https://doi.org/10.1016/j.csi.2007.12.001}, doi = {10.1016/J.CSI.2007.12.001}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csi/GaoLW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/informaticaLT/GaoWWY09, author = {Wei Gao and Guilin Wang and Xueli Wang and Zhenguang Yang}, title = {One-Round ID-Based Threshold Signature Scheme from Bilinear Pairings}, journal = {Informatica}, volume = {20}, number = {4}, pages = {461--476}, year = {2009}, url = {http://content.iospress.com/articles/informatica/info20-4-01}, timestamp = {Tue, 26 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/informaticaLT/GaoWWY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/GaoWLC09, author = {Wei Gao and Zhenyou Wang and Fei Li and Li'e Chen}, title = {An Efficient Threshold Signature Scheme Without Random Oracles}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {400--404}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.40}, doi = {10.1109/CIS.2009.40}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/GaoWLC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/WangGCL09, author = {Zhenyou Wang and Wei Gao and Li'e Chen and Fei Li}, title = {Perfect Subliminal Channel in a Paring-Based Digital Signature}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers}, pages = {455--457}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.24}, doi = {10.1109/CIS.2009.24}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/WangGCL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/GaoLX08, author = {Wei Gao and Fei Li and Banghai Xu}, title = {An Abuse-Free Optimistic Fair Exchange Protocol Based on {BLS} Signature}, booktitle = {2008 International Conference on Computational Intelligence and Security, {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 2, Workshop Papers}, pages = {278--282}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CIS.2008.44}, doi = {10.1109/CIS.2008.44}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/GaoLX08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pairing/GaoWWL08, author = {Wei Gao and Guilin Wang and Xueli Wang and Fei Li}, editor = {Steven D. Galbraith and Kenneth G. Paterson}, title = {One-Round ID-Based Blind Signature Scheme without {ROS} Assumption}, booktitle = {Pairing-Based Cryptography - Pairing 2008, Second International Conference, Egham, UK, September 1-3, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5209}, pages = {316--331}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85538-5\_21}, doi = {10.1007/978-3-540-85538-5\_21}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/pairing/GaoWWL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcst/GaoWX07, author = {Wei Gao and Xueli Wang and Dongqing Xie}, title = {Chameleon Hashes Without Key Exposure Based on Factoring}, journal = {J. Comput. Sci. Technol.}, volume = {22}, number = {1}, pages = {109--113}, year = {2007}, url = {https://doi.org/10.1007/s11390-007-9015-9}, doi = {10.1007/S11390-007-9015-9}, timestamp = {Sat, 09 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcst/GaoWX07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GaoWWL07, author = {Wei Gao and Xueli Wang and Guilin Wang and Fei Li}, title = {One-Round ID-Based Blind Signature Scheme without {ROS} Assumption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {7}, year = {2007}, url = {http://eprint.iacr.org/2007/007}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GaoWWL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/GaoWWX06, author = {Wei Gao and Guilin Wang and Xueli Wang and Dongqing Xie}, editor = {Jae{-}Kwang Lee and Okyeon Yi and Moti Yung}, title = {Controllable Ring Signatures}, booktitle = {Information Security Applications, 7th International Workshop, {WISA} 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4298}, pages = {1--14}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-540-71093-6\_1}, doi = {10.1007/978-3-540-71093-6\_1}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/wisa/GaoWWX06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.