Author of the publication

Identity-Based Revocation From Subset Difference Methods Under Simple Assumptions.

, and . IEEE Access, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Variant of Park-Lee Identity-Based Encryption System., and . IEICE Transactions, 99-A (3): 720-732 (2016)A Hidden Vector Encryption Scheme with Constant-Size Tokens and Pairing Computations., and . IEICE Transactions, 93-A (9): 1620-1631 (2010)Security Analysis of a Multi-Receiver Identity-Based Key Encapsulation Mechanism., and . IEICE Transactions, 92-A (1): 329-331 (2009)Cryptanalysis of Chatterjee-Sarkar Hierarchical Identity-Based Encryption Scheme at PKC 06., and . IEICE Transactions, 92-A (7): 1724-1726 (2009)Transmission-Efficient Broadcast Encryption Scheme with Personalized Messages., , and . IEICE Transactions, 96-A (4): 796-806 (2013)A New Public Key Broadcast Encryption Using Boneh-Boyen-Goh's HIBE Scheme., and . ISPEC, volume 4991 of Lecture Notes in Computer Science, page 101-115. Springer, (2008)Bogus Data Filtering in Sensor Networks., , , and . PAKDD Workshops, volume 4819 of Lecture Notes in Computer Science, page 629-635. Springer, (2007)Generic construction of designated tester public-key encryption with keyword search., , and . Inf. Sci., (2012)Identity-Based Revocation From Subset Difference Methods Under Simple Assumptions., and . IEEE Access, (2019)On the Security of Luo et al.'s Fully Secure Hierarchical Identity Based Encryption Scheme., , and . IEICE Transactions, 95-A (9): 1631-1636 (2012)