Author of the publication

Plaintext-Checkable Encryption.

, , , and . CT-RSA, volume 7178 of Lecture Notes in Computer Science, page 332-348. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Secure Universal Loyalty Card., , and . WOSIS, page 13-22. INSTICC Press, (2006)Privacy-Preserving RFID Systems: Model and Constructions., , , and . IACR Cryptology ePrint Archive, (2010)Defeating Malicious Servers in a Blind Signatures Based Voting System., , and . Financial Cryptography, volume 4107 of Lecture Notes in Computer Science, page 148-153. Springer, (2006)Plaintext-Checkable Encryption., , , and . CT-RSA, volume 7178 of Lecture Notes in Computer Science, page 332-348. Springer, (2012)Group Key Management: From a Non-hierarchical to a Hierarchical Structure., and . INDOCRYPT, volume 5365 of Lecture Notes in Computer Science, page 213-225. Springer, (2008)On Fair E-cash Systems Based on Group Signature Schemes., and . ACISP, volume 2727 of Lecture Notes in Computer Science, page 237-248. Springer, (2003)Achieving Optimal Anonymity in Transferable E-Cash with a Judge., , , , , and . AFRICACRYPT, volume 6737 of Lecture Notes in Computer Science, page 206-223. Springer, (2011)Highly privacy-protecting data sharing in a tree structure., and . Future Generation Comp. Syst., (2016)Differential Privacy in distribution and instance-based noise mechanisms., and . IACR Cryptology ePrint Archive, (2015)Improving the Security of an Efficient Unidirectional Proxy Re-Encryption Scheme., , and . J. Internet Serv. Inf. Secur., 1 (2/3): 140-160 (2011)