Author of the publication

Efficient multi-key fully homomorphic encryption over prime cyclotomic rings with fewer relinearisations.

, , , , , and . IET Inf. Secur., 15 (6): 472-486 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Leakage-Resilient IBE/ABE with Optimal Leakage Rates from Lattices., , and . IACR Cryptol. ePrint Arch., (2021)Novel Identity-Based Hash Proof System with Compact Master Public Key from Lattices in the Standard Model., , , , , and . Int. J. Found. Comput. Sci., 30 (4): 589-606 (2019)Anonymous Identity-Based Hash Proof System from Lattices in the Standard Model., , , , and . ACISP, volume 10946 of Lecture Notes in Computer Science, page 539-557. Springer, (2018)Updatable Identity-Based Hash Proof System Based on Lattices and Its Application to Leakage-Resilient Public-Key Encryption Schemes., , , , , and . J. Comput. Sci. Technol., 33 (6): 1243-1260 (2018)Novel Smooth Hash Proof Systems Based on Lattices., , , , and . Comput. J., 61 (4): 561-574 (2018)Lattice-based certificateless encryption scheme., , , , and . Frontiers of Computer Science, 8 (5): 828-836 (2014)Natural sd-RCCA Secure Public-key Encryptions from Hybrid Paradigms., , , , and . J. UCS, 25 (3): 158-181 (2019)Natural sd-RCCA Secure Public-Key Encryptions., , and . ProvSec, volume 10592 of Lecture Notes in Computer Science, page 236-250. Springer, (2017)New method of key-dependent message security for asymmetric encryption., , , , and . Security and Communication Networks, 8 (13): 2157-2170 (2015)Construction of a key-dependent message secure symmetric encryption scheme in the ideal cipher model., , , , and . Frontiers Comput. Sci., 8 (3): 469-477 (2014)