Author of the publication

Public-Key Function-Private Hidden Vector Encryption (and More).

, , , , , , , , and . ASIACRYPT (3), volume 11923 of Lecture Notes in Computer Science, page 489-519. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adaptive versus Non-Adaptive Security of Multi-Party Protocols., , , , and . J. Cryptology, 17 (3): 153-207 (2004)Exploring the Boundaries of Topology-Hiding Computation., , , and . EUROCRYPT (3), volume 10822 of Lecture Notes in Computer Science, page 294-325. Springer, (2018)Mercurial Commitments with Applications to Zero-Knowledge Sets., , , , and . EUROCRYPT, volume 3494 of Lecture Notes in Computer Science, page 422-439. Springer, (2005)Privacy Preserving Pattern Classification., , and . ICIP, page 1684-1687. IEEE, (2008)On the performance, feasibility, and use of forward-secure signatures., , , and . ACM Conference on Computer and Communications Security, page 131-144. ACM, (2003)Reducing the Servers' Computation in Private Information Retrieval: PIR with Preprocessing., , and . J. Cryptology, 17 (2): 125-151 (2004)LP Decoding Corrects a Constant Fraction of Errors., , , , and . IEEE Trans. Information Theory, 53 (1): 82-89 (2007)Secure Computation with Sublinear Amortized Work., , , , , and . IACR Cryptology ePrint Archive, (2011)A Black-Box Construction of Non-Malleable Encryption from Semantically Secure Encryption., , , and . IACR Cryptology ePrint Archive, (2016)Oblivious Image Matching., , , and . Protecting Privacy in Video Surveillance, Springer, (2009)