Author of the publication

Public Key Encryption with Authorized Keyword Search.

, , , and . ACISP (2), volume 9723 of Lecture Notes in Computer Science, page 170-186. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Identity-based revocation system: Enhanced security model and scalable bounded IBRS construction with short parameters., , , , , , , and . Inf. Sci., (2019)Recipient Revocable Identity-Based Broadcast Encryption: How to Revoke Some Recipients in IBBE without Knowledge of the Plaintext., , , , , and . AsiaCCS, page 201-210. ACM, (2016)Identity-Based Encryption: How to Decrypt Multiple Ciphertexts Using a Single Decryption Key., , and . Pairing, volume 4575 of Lecture Notes in Computer Science, page 392-406. Springer, (2007)Identity Based Private Matching., , , and . SECPerU, page 85-90. IEEE Computer Society, (2007)Public Key Encryption with Authorized Keyword Search., , , and . ACISP (2), volume 9723 of Lecture Notes in Computer Science, page 170-186. Springer, (2016)Generalized closest substring encryption., , and . Des. Codes Cryptogr., 80 (1): 103-124 (2016)Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage., , , , and . IEEE Trans. Information Forensics and Security, 11 (4): 789-798 (2016)Server-Aided Public Key Encryption With Keyword Search., , , , , , and . IEEE Trans. Information Forensics and Security, 11 (12): 2833-2842 (2016)Centralized keyword search on encrypted data for cloud applications., , , , and . Security and Communication Networks, 9 (18): 5064-5084 (2016)Short Signatures with a Tighter Security Reduction Without Random Oracles., , and . Comput. J., 54 (4): 513-524 (2011)